US7869219B2 - Flash drive with spring-loaded retractable connector - Google Patents

Flash drive with spring-loaded retractable connector Download PDF

Info

Publication number
US7869219B2
US7869219B2 US12/361,772 US36177209A US7869219B2 US 7869219 B2 US7869219 B2 US 7869219B2 US 36177209 A US36177209 A US 36177209A US 7869219 B2 US7869219 B2 US 7869219B2
Authority
US
United States
Prior art keywords
housing
plug connector
page
flash memory
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US12/361,772
Other versions
US20090177835A1 (en
Inventor
Abraham C. Ma
Jim Chin-Nan Ni
Nan Nan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Super Talent Electronics Inc
Super Talent Tech Corp
Original Assignee
Super Talent Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/761,853 external-priority patent/US20050160218A1/en
Priority claimed from US11/466,759 external-priority patent/US7702831B2/en
Priority claimed from US11/682,261 external-priority patent/US7420803B2/en
Priority claimed from US11/845,747 external-priority patent/US20070292009A1/en
Priority claimed from US11/950,190 external-priority patent/US8014130B1/en
Priority claimed from US12/025,706 external-priority patent/US7886108B2/en
Priority claimed from US12/050,748 external-priority patent/US7628622B2/en
Priority claimed from US12/171,194 external-priority patent/US7771215B1/en
Priority to US12/361,772 priority Critical patent/US7869219B2/en
Application filed by Super Talent Electronics Inc filed Critical Super Talent Electronics Inc
Assigned to SUPER TALENT ELECTRONICS, INC. reassignment SUPER TALENT ELECTRONICS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MA, ABRAHAM C., NAN, Nan, NI, JIM CHIN-NAN
Publication of US20090177835A1 publication Critical patent/US20090177835A1/en
Priority to US12/505,327 priority patent/US7850468B2/en
Priority to US12/629,002 priority patent/US8241047B2/en
Priority to US12/834,647 priority patent/US7944702B2/en
Priority to US12/943,892 priority patent/US8116083B2/en
Application granted granted Critical
Publication of US7869219B2 publication Critical patent/US7869219B2/en
Assigned to SUPER TALENT TECHNOLOGY, CORP. reassignment SUPER TALENT TECHNOLOGY, CORP. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SUPER TALENT ELECTRONIC, INC.
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C16/00Erasable programmable read-only memories
    • G11C16/02Erasable programmable read-only memories electrically programmable
    • G11C16/06Auxiliary circuits, e.g. for writing into memory
    • G11C16/10Programming or data input circuits
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C11/00Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
    • G11C11/56Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency
    • G11C11/5621Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency using charge storage in a floating gate
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C16/00Erasable programmable read-only memories
    • G11C16/02Erasable programmable read-only memories electrically programmable
    • G11C16/04Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS
    • G11C16/0408Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS comprising cells containing floating gate transistors
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C2211/00Indexing scheme relating to digital stores characterized by the use of particular electric or magnetic storage elements; Storage elements therefor
    • G11C2211/56Indexing scheme relating to G11C11/56 and sub-groups for features not covered by these groups
    • G11C2211/564Miscellaneous aspects
    • G11C2211/5641Multilevel memory having cells with different number of storage levels

Definitions

  • the invention relates to flash memory devices, more particularly to systems and methods of managing memory addresses in a large capacity multi-level cell (MLC) based flash memory device.
  • MLC multi-level cell
  • Flash memory As flash memory technology becomes more advanced, flash memory is replacing traditional magnetic disks as storage media for mobile systems. Flash memory has significant advantages over floppy disks or magnetic hard disks such as having high-G resistance and low power dissipation. Because of the smaller physical size of flash memory, they are also more conducive to mobile systems. Accordingly, the flash memory trend has been growing because of its compatibility with mobile systems and low-power feature. However, advances in flash technology have created a greater variety of flash memory device types that vary for reasons of performance, cost and capacity. As such, a problem arises when mobile systems that are designed for one type of flash memory are constructed using another, incompatible type of flash memory.
  • PC personal computer
  • USB Universal Serial Bus
  • flash memory is replacing floppy disks because flash memory provides higher storage capacity and faster access speeds than floppy drives.
  • flash memory sectors that have already been programmed must be erased before being reprogrammed. Also, flash memory sectors have a limited life span; i.e., they can be erased only a limited number of times before failure. Accordingly, flash memory access is slow due to the erase-before-write nature and ongoing erasing will damage the flash memory sectors over time.
  • USB-standard flash memory To address the speed problems with USB-standard flash memory, hardware and firmware utilize existing small computer systems interface (SCSI) protocols so that flash memory can function as mass-storage devices similarly to magnetic hard disks. SCSI protocols have been used in USB-standard mass-storage devices long before flash memory devices have been widely adopted as storage media. Accordingly, the USB standard has incorporated traditional SCSI protocols to manage flash memory.
  • SCSI small computer systems interface
  • multi-level cell flash memory which stores one-bit of information per cell
  • hybrid flash memory which is assembled partially SLC and partially MLC
  • MLC flash memory allows at least two bits per cell.
  • problems associated with the MLC flash memory First, the MLC flash memory has a low reliability.
  • the MLC flash memory data programming rules require writing to an ascending page in the same block or writing to a blank new page if there are data existed in the original page.
  • a larger capacity requires a large logical-to-physical address look up table.
  • the size look up table is in direct portion with the capacity of the flash memory. This creates a huge problem not only to the cost, but also to the physical size of the flash memory device. Furthermore, the traditional usage of the flash memory devices is generally in a very clean and relatively mild environment, thus the packaging design such as enclosure of the flash memory device is not suitable for hostile environment such as military and heavy industrial applications.
  • Modern portable computer peripheral devices for storing confidential data take many mechanical forms. In most cases, such peripheral devices have been reduced to “pocket size”, meaning that they can literally be carried in a user's pocket in the same manner as a wallet or set of keys.
  • One example of particular interest is a pen-type flash device having a USB connector plug that can be connected to a USB port of a standard computer. The USB plug connector is protected by a removable cover when not in use.
  • a problem with convention pen-type peripheral devices is that the removable cover can become inadvertently lost while the device is in use, thereby leaving the USB plug connector exposed to damage or contamination.
  • a device with a retractable connector generally has a button feature on the outside of its housing that allows a user to manually slide the connector between a retracted position and an extended (deployed) position. In the extended position, the connector extends through an opening in the housing so that it may be plugged into a receptacle. In the retracted position, the connector is contained within the housing and is protected by the housing, thereby obviating the need for a separate cap that can be lost.
  • press-push memory devices avoid the problems of conventional pen-type peripheral devices, e.g., by avoiding the need for a separate cap, the molded plastic used to produce these devices can become worn over a relatively short amount of time, leading to undesirable resistance or jamming that prevents the desired retraction of the connector when not in use.
  • a MLC based flash memory device comprises a card body with a processing unit, an input/output (I/O) circuit and at least one MLC flash memory chip mounted thereon.
  • the card body may comprise a print circuit board (PCB).
  • the I/O circuits generally are coupled to the processing unit in form of an integrated circuit.
  • the processing unit manages data transfers between a host computing device (e.g., personal computer, consumer electronic device) and the at least one flash memory chip.
  • the MLC based flash memory chip is configured to provide data storage for the host.
  • the present invention is particularly directed to a retractable portable computer peripheral device (apparatus) for safely transporting a MLC based flash memory chip (device) in which a plug connector (e.g., a USB plug connector) is electrically connected to the MLC based flash memory device and is manually retracted inside or deployed through a front end (second) opening of an elongated housing by way of a spring-loaded mechanism that biases the plug connector either into or out of the housing.
  • the spring-loaded mechanism includes an actuating button that protrudes through an actuator (first) opening defined in the housing, and a locking structure that secures the plug connector in the retracted and deployed positions.
  • a resilient member preferably a linear spring, is coupled to the plug connector and either to a front portion or a rear portion of the housing, depending on whether the spring is used to deploy or retract the plug connector.
  • a linear spring is connected between the plug connector and the rear housing portion, whereby the plug connector is deployed from the housing by manually pressing and sliding the actuating button to stretch a linear spring until the lock mechanism is engaged, and subsequent retraction of the connector into the housing enclosure is performed by releasing the spring-loaded mechanism (e.g., by re-pressing the actuating button), whereby the mechanical energy stored in the linear spring biases the connector back inside the housing.
  • the linear spring is connected between the plug connector and the front housing portion such that the spring is stretched in the retracted position, and subsequent release of the spring-loaded mechanism causes the linear spring to bias the connector out of the housing into its deployed position.
  • the spring-loaded mechanism includes an assembly formed by a sliding rack (positioning member) and a printed circuit board assembly (PCBA), where the plug connector is fixed connected to a front end of the PCBA, the MLC based flash memory chip is mounted on the PCBA, and the actuating button is integrally formed on or attached to the sliding rack.
  • the deployed/retracted position of the assembly inside an elongate housing is controlled by a locking mechanism controlled by the actuating button and a corresponding locking member disposed on the housing.
  • the button extends through a slot defined in a side wall of the housing such that, when a user manually presses and slides the press-push button along the slot, the user is able to move the plug connector between a retracted position, in which the plug connector is positioned inside of the housing, and a deployed position in which the plug connector extends through the opening and is exposed outside of the housing.
  • the button extends through a rear opening defined in the rear portion of the housing such that the user manually presses or pulls the button to move the plug connector between the retracted and deployed positions.
  • a spring is connected between the sliding rack and the housing to bias the assembly either into the deployed position or into the retracted position.
  • the sliding rack includes a base portion and a pair of side walls fixedly attached to the base portion, and two or more linear springs are disposed on opposing sides of the positioning member such that the linear springs are parallel to and in contact with the side walls.
  • the linear springs are slidably received inside elongated side grooves provided on the side walls. With this arrangement, the linear springs are maintained in a planar region defined by the side grooves and/or a spaced between the side walls of the slide rack and opposing side walls of the housing, thereby providing reliable and long-lasting spring-loaded functionality while requiring a minimum of space. Further, by disposing the linear springs on opposite sides of the slide rack, the slide rack is biased into a central position within the housing, thereby reducing wear caused by repeated retraction/deployment operations.
  • a flexible wall is disposed on the base portion of the sliding rack, and a press-push-type actuating button is integrally disposed on the flexible wall such that the actuating button extends through a slot defined in the housing wall.
  • the flexible wall is supported by the sliding rack in the housing such that when the press-push button is manually pressed into the housing, the slide rails (side walls) of the sliding rack contact and slide along an inside surface of the housing wall, thus allowing the flexible wall to bend or otherwise resiliently deflect into the housing.
  • the press-push button is subsequently released, the flexible wall resiliently returns the press-push button to its original (raised) position. This resilient bending is utilized to engage and disengage the locking structure (e.g., a locking tab) formed on the flexible wall from corresponding locking structures (e.g., lock grooves) formed on the housing wall.
  • FIGS. 1(A) and 1(B) are simplified diagrams showing electronic apparatus representing simplified embodiments of the present invention.
  • FIG. 2A is a diagram depicting a data structure of an exemplary large capacity flash memory, according one embodiment of the present invention.
  • FIG. 2B is a diagram showing an exemplary scheme for partitioning a logical sector address in accordance with one embodiment of the present invention
  • FIG. 3 is a simplified block diagram illustrating salient components of an exemplary processing unit of each of the electronic flash memory devices of FIGS. 1(A) and 1(B) , according to an embodiment of the present invention
  • FIGS. 4A-4F collectively show exemplary data structures used for managing memory addresses of the flash memory of FIG. 2A in accordance with one embodiment of the present invention
  • FIGS. 5A-5E collectively show a flow chart of an exemplary process of conducting data transfer requests of the flash memory of FIG. 2A in accordance with one embodiment of the present invention
  • FIGS. 6A-6E collectively show a sequence of data write requests to demonstrate the exemplary process 500 of FIGS. 5A-5E ;
  • FIGS. 7A-7E collectively are a flowchart illustrating an exemplary process of initialization of a large capacity flash memory device in accordance with one embodiment of the present invention
  • FIGS. 8(A) and 8(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to an embodiment of the present invention
  • FIG. 9 is an exploded perspective view showing the peripheral device of FIG. 8(A) in additional detail
  • FIGS. 10-1 and 10 - 2 are partial perspective views depicting the peripheral device of FIG. 8(A) during operation;
  • FIGS. 10(A) , 10 (B) and 10 (C) are simplified cross-sectional side views depicting the peripheral device of FIG. 8 (A) during operation;
  • FIGS. 11(A) and 11(B) are exploded perspective and perspective views, respectively, showing a sliding rack assembly of the sliding-rack assembly for a pen-type computer peripheral device similar to that shown in FIG. 8(A) according to an alternative embodiment of the present invention
  • FIGS. 12(A) and 12(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to another embodiment of the present invention.
  • FIG. 13 is an exploded perspective view showing the peripheral device of FIG. 12(A) in additional detail;
  • FIGS. 14-1 and 14 - 2 are partial perspective views depicting the peripheral device of FIG. 12(A) during operation;
  • FIGS. 14(A) , 14 (B) and 14 (C) are simplified cross-sectional side views depicting the peripheral device of FIG. 12(A) during operation;
  • FIGS. 15(A) and 15(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to another embodiment of the present invention.
  • FIG. 16 is an exploded perspective view showing the sliding-rack assembly of the pen-type computer peripheral device of FIG. 15(A) in additional detail;
  • FIG. 17 is an exploded perspective view showing the pen-type computer peripheral device of FIG. 15(A) in additional detail;
  • FIGS. 18(A) and 18(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to another embodiment of the present invention.
  • FIG. 19 is an exploded perspective view showing the peripheral device of FIG. 18(A) in additional detail;
  • FIGS. 20(A) and 20(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to another embodiment of the present invention.
  • FIG. 21 is an exploded perspective view showing the sliding-rack assembly of the pen-type computer peripheral device of FIG. 20(A) in additional detail;
  • FIG. 22 is an exploded perspective view showing the pen-type computer peripheral device of FIG. 20(A) in additional detail;
  • FIGS. 23(A) and 23(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to another embodiment of the present invention.
  • FIGS. 24(A) , 24 (B) and 24 (C) are exploded perspective views showing alternative PCBA and USB plug connector arrangements according to alternative embodiments of the invention.
  • the present invention relates to an improvement in flash memory devices such as USB flash drives.
  • flash memory devices such as USB flash drives.
  • the following description is presented to enable one of ordinary skill in the art to make and use the invention as provided in the context of a particular application and its requirements.
  • directional terms such as “upper”, “upwards”, “lower”, “downward”, “front”, “rear”, are intended to provide relative positions for purposes of description, and are not intended to designate an absolute frame of reference.
  • FIG. 1(A) is a block diagram illustrating an electronic environment in which the present invention may be deployed in an exemplary electronic flash memory device.
  • FIG. 1(A) is a simplified diagram showing a portable computer peripheral apparatus (e.g., a flash drive device) 100 - 1 according to a generalized embodiment of the present invention.
  • Apparatus 100 - 1 is adapted to be accessed by an external computer 90 , and is shown to include a printed circuit board assembly (PCBA) 120 including a card body 121 , a processing unit 122 , a memory device 123 , and an input/output interface circuit 125 .
  • PCBA printed circuit board assembly
  • Card body 121 is configured for providing electrical and mechanical connection for the processing unit 122 , the flash memory module 123 , the I/O interface circuit 125 , and all of the optional components.
  • Card body 121 may comprise a printed circuit board (PCB) or an equivalent substrate such that all of the components as integrated circuits may be mounted thereon.
  • the substrate may be manufactured using surface mount technology (SMT) or chip on board (COB) technology.
  • Processing unit 122 and the I/O interface circuit 125 are collectively configured to provide various control functions (e.g., data read, write and erase transactions) of the flash memory module 123 .
  • Processing unit 122 may also be a standalone microprocessor or microcontroller, for example, an 8051, 8052, or 80286 Intel® microprocessor, or ARM®, MIPS® or other equivalent digital signal processor.
  • Processing unit 122 and the I/O interface circuit 125 may be made in a single integrated circuit, for application specific integrated circuit (ASIC).
  • ASIC application specific integrated circuit
  • the at least one flash memory module 123 may comprise one or more flash memory chips or integrated circuits.
  • the flash memory chips may be single-level cell (SLC) or multi-level cell (MLC) based.
  • SLC flash memory each cell holds one bit of information, while more than one bit (e.g., 2, 4 or more bits) are stored in a MLC flash memory cell.
  • a detail data structure of an exemplary flash memory is described and shown in FIG. 2A and corresponding descriptions thereof.
  • Flash memory module 123 stores, in a known manner therein, one or more data files and an optional reference password. In one embodiment, only authorized users can access the stored data files.
  • the data file can be a picture file, a text file or any other file.
  • Input/output interface circuit 125 is mounted on the card body 121 , and can be activated so as to establish communication with the host computing device 90 by way of a socket 95 via an interface bus 93 that is established when a connector 150 attached to card body 121 is coupled with socket 95 .
  • Input/output interface circuit 125 may include circuits and control logic associated with a Universal Serial Bus (USB) interface structure that is connectable to an associated socket connected to or mounted on the host computing device 90 .
  • USB Universal Serial Bus
  • Processing unit 122 is controlled by a software program module (e.g., a firmware (FW)), which may be stored partially in a ROM (not shown) such that processing unit 122 is operable selectively in: (1) a data programming or write mode, where processing unit 122 activates input/output interface circuit 125 to receive data from the host computing device 90 under the control of the host computing device 90 , and store the data in the flash memory module 123 ; (2) a data retrieving or read mode, where the processing unit 122 activates the input/output interface circuit 125 to transmit data stored in the flash memory module 123 to the host computing device 90 ; or (3) a data resetting or erasing mode, where data in stale data blocks are erased or reset from the flash memory module 123 .
  • a software program module e.g., a firmware (FW)
  • ROM not shown
  • host computing device 90 sends write and read data transfer requests to the first flash memory device 100 - 1 via the interface bus 93 , then input/output interface circuit 125 to the processing unit 122 , which in turn utilizes a flash memory controller (not shown or embedded in the processing unit) to read from or write to the associated at least one flash memory module 123 .
  • the processing unit 122 automatically initiates an operation of the data resetting mode upon detecting a predefined time period has elapsed since the last authorized access of the data stored in flash memory module 123 .
  • FIG. 2A is a diagram depicting an exemplary data structure 200 of a flash memory module 201 (e.g., flash memory module 123 of FIG. 1(A) ) in accordance with one embodiment of the present invention.
  • the flash memory module 201 is divided into a plurality of physical blocks e.g., PBK# 0 , PBK# 1 , PBK# 2 , . . . ).
  • PBK# 0 the first block 202
  • normal usage data blocks 204 i.e., PBK# 1 , PBK# 2 , . . .
  • the first block (PBK# 0 ) 202 is guaranteed to be a good block and used by the manufacturer to store certain information such as Flash Timing Parameter (FTP), and other information by Initial Manufacturing Program (IMP), which cannot be alter by users.
  • FTP Flash Timing Parameter
  • IMP Initial Manufacturing Program
  • the manufacturer may define a percentage (e.g., 95%) of the total capacity as normal usage data blocks and the rest as reserved.
  • the normal usage data blocks 204 are configured for user to store user data, although the first block (i.e., PBK# 1 ) of the normal usage data blocks 204 is generally used for storing Master Boot Record (MBR), which contains critical data for operation of a computing device.
  • MLR Master Boot Record
  • the reserved blocks 206 are configured to be accessed by a program module (e.g., FW) via special memory addresses in accordance with one embodiment of the present invention. Examples of the special memory address are 0xFFFF0000, 0xFFFF0001, 0xFFFFFF00, 0xFFFFFF01, etc.
  • Each block is further divided into a plurality of pages 208 (e.g., P 0 , P 1 , . . . , Pn p ).
  • Each of the pages 208 includes a data area 210 and a spare area 212 .
  • the data area is partitioned into a plurality of sectors (e.g., S 0 , S 1 , . . . , Sn s ).
  • each sector stores 512-byte of data.
  • the spare area 212 is configured to provide three different fields: 1) a block indicator (BB) 214 , a logical address area 216 and an error correction code (ECC) area 218 .
  • BB block indicator
  • ECC error correction code
  • the block indicator 214 of that block is set to a special code to indicate a bad block that cannot be used.
  • the logical address area 216 is configured for identifying of that particular physical block for initialization of the flash memory device. More details are described in FIG. 4E and FIG. 4F for the reserved physical blocks as used by an embodiment of the present invention. Detailed processes of initialization are shown in FIGS. 7A-7E .
  • the ECC area 218 is configured to store the ECC for ensuring data integrity.
  • the host computing device 90 transmits a data transaction request (e.g., data read or write) along with a logical sector address (LSA) to the flash memory device.
  • LSA logical sector address
  • the processing unit 102 of the flash memory device converts the received LSA into a physical address (i.e., specific block, page and sector numbers) before any data transaction can be performed.
  • the conversion is performed by an address look up table with a one-to-one relationship to the physical address. This solution works for a flash memory device with relatively small capacity, because the address look up table is implemented with a static random access memory (SRAM).
  • SRAM static random access memory
  • FIG. 2B is a diagram showing an exemplary scheme for partitioning a logical sector address in accordance with one embodiment of the present invention.
  • a logical sector address (LSA) 250 is traditionally partitioned as three parts: block 252 , page 254 and sector 256 .
  • the block portion 252 is also referred to as logical block address (LBA).
  • LSA 250 is partitioned into four parts: set 262 , entry 264 , page 254 and sector 256 .
  • the page 254 and sector 256 remain the same.
  • the block 252 is further partitioned into two parts: the set 262 and the entry 264 . In other words, instead of just using block 252 as basic unit, the blocks are divided into a plurality of sets 262 .
  • Each of the sets 262 includes a plurality of entries 264 .
  • the LSA 270 could represent up to 64 sets of 256 entries (i.e., 16,384 blocks) with each block containing 128 pages and each page containing 8 sectors of 512-byte of data.
  • the number of the plurality of sets is N, where N is a positive integer.
  • the manufacturer may predefine number of sets and entries in the first physical block (i.e., PBK# 0 ) by the IMP.
  • PBK# 0 the first physical block
  • the IMP may predefine number of sets and entries in the first physical block (i.e., PBK# 0 ) by the IMP.
  • LSA logical sector addresses
  • only a portion of the LSA i.e., a set
  • a limited size memory is configured to hold one set of entries with each entry including an address of the corresponding physical block and a plurality of corresponding page usage flags (see FIG. 4A for details).
  • 18-byte i.e., 2-byte for the physical block address plus 128-bit or 16-byte for 128 page usage flags
  • a total of 4608-byte of memory is required for a set with 256 entries.
  • every entry in each of the plurality of sets must correlate to a unique physical address and a set of page usage flags. Since the limited size memory only has capacity of holding one set of such information, an embodiment of the present invention requires that information of all of the plurality of sets be stored in reserved area 206 of the flash memory 201 . Only a relevant set of the plurality of sets is loaded into the limited size memory in response to a particular data transfer request from a host computing system 109 . The relevant set is defined as the set with one of the entries matches the entry number derived from the LSA associated with the received data transfer request.
  • each of the N sets is referred to as a partial logical-to-physical address and page usage information (hereinafter ‘PLTPPUI’) appended with a set number (e.g., ‘PLTPPUI 0 ’, ‘PLTPPUI 1 ’, ‘PLTPPUIN’).
  • PTPPUI partial logical-to-physical address and page usage information
  • LSA LBA
  • sector page
  • entry and set numbers Those of ordinary skill in the art will understand implementation of an embodiment of the present invention can be with larger numbers.
  • LSA logical sector address
  • the least significant four bits of LSA represent sector and page numbers with the two lowest bits for the sector number and the next two for the page number, as each two-bit represents four distinct choices—0, 1, 2 and 3.
  • LBA logical block address
  • LBA has a binary value of ‘1001’. Because there are four entries per set in this example, two least significant bits of LBA represent the entry number (i.e., offset number in each set). The remaining high bits of LBA represent the set number.
  • Table 1 A summary of this example is listed in Table 1.
  • an indexing scheme enables the processing unit 102 to translate logical sector addresses (LSAs) and/or logical block addresses (LBAs) provided, in conjunction with a data transfer request, by the host computing device 109 to physical block numbers or addresses (PBK#) in the flash memory device 140 .
  • the indexing scheme comprises a plurality of sets of PLTPPUI and physical characteristics of the flash memory such as total number of sets, entries, pages and sectors. And ratios among the set, entry, page and sector.
  • the processing unit 102 can utilize the indexing scheme to determine which sectors of the flash memory are available for each particular data transfer request.
  • FIG. 3 is a simplified block diagram showing salient components of the process unit 102 of an electronic flash memory device in accordance with one embodiment of the present invention.
  • the processing unit 102 comprises a microcontroller or microprocessor 302 , an address correlation and page usage memory (ACPUM) 306 , a PLTPPUI tracking table 308 , a wear leveling and bad block (WL/BB) tracking table 310 , a ACPUM modification flag (ACPUMF) 312 , a page buffer 314 and a set of sector update flags 316 .
  • ACPUM address correlation and page usage memory
  • PLTPPUI tracking table 308 a wear leveling and bad block
  • WL/BB wear leveling and bad block
  • ACPUMF ACPUM modification flag
  • the microcontroller 302 with a flash memory controlling program module 304 (e.g., a firmware (FW)) installed thereon is configured to control the data transfer between the host computing device 109 and the at least one flash memory module 103 .
  • the ACPUM 306 is configured to provide an address correlation table, which contains a plurality of entries, each represents a correlation between a partial logical block address (i.e., entries) to the corresponding physical block number. In addition, a set of page usage flags associated with the physical block is also included in each entry.
  • the ACPUM 306 represents only one of the N sets of PLTPPUI, which is stored in the reserved area of the flash memory.
  • the physical location is stored in the PLTPPUI tracking table 308 .
  • Each item is the PLTPPUI tracking table 308 corresponds a first special logical address to one of the N sets of PLTPPUI.
  • the wear leveling counters and bad block indicator for each physical block is stored in a number of physical blocks referred by corresponding second special logical addresses (e.g., ‘0xFFFFFF00’).
  • the WL/BB tracking table 310 is configured to store physical block numbers that are assigned or allocated for storing these physical block wear leveling counters and bad blocks.
  • the ACPUM modification flag (ACPUMF) 312 is configured to hold an indicator bit that tracks whether the ACPUM 306 has been modified or not.
  • the page buffer 314 is configured to hold data in a data transfer request.
  • the page buffer 314 has a size equaling to the page size of the flash memory 201 .
  • the sector update flags 316 are configured to hold valid data flag for each of the corresponding sectors written into data area of the page buffer 314 . For example, four sector update flags are be required for a page buffer comprising four sectors.
  • the page buffer 314 also includes a spare area for holding other vital information such as error correction code (ECC) for ensuring data integrity of the flash memory.
  • ECC error correction code
  • FIGS. 4A-4F collectively show exemplary data structures used for managing memory addresses of the flash memory of FIG. 2A in accordance with one embodiment of the present invention.
  • the ACPUM data structure 410 contains N e rows of entries 414 , where N e is a positive integer. Each row contains a physical block number or address (PBK#) 416 and a plurality of page usage flags 418 associated with the PBK#. The number of pages (N p ) is determined by the physical flash memory cell structure and defined by the IMP.
  • ACPUMF 412 contains one bit, which is a toggle switch representing whether the ACPUM 306 has been modified or not. The ACPUMF 412 may be implemented as a register containing either 0 (not modified) or 1 (modified).
  • the page buffer 430 includes a data area containing plurality of sectors (S 1 , S 2 , . . . , Sn s ) and a spare area (not shown in FIG. 4A ) containing other information such as ECC.
  • a set of sector update flags 432 is configured to represent respective sectors in the page buffer 430 .
  • Each of the sector update flags 432 indicates either a corresponding sector contains a valid data or not. In one implementation, valid data is represented as “1”, while initial or stale state as “0”. These flags may be implemented in a different logic such as reversing the binary representation. As discussed in the prior sections and shown in FIG.
  • N there are N sets of PLTPPUI 411 a - n , where N is a positive integer.
  • the N sets of PLTPPUI 411 a - n represent all of the logical blocks in correlation with physical blocks. Only one of the N sets is loaded into the ACPUM 306 at one time.
  • Each set of the PLTPPUI is stored in the reserved area 206 of the flash memory 201 of FIG. 2A in a data structure 420 shown in FIG. 4C .
  • the contents of each set of PLTPPUI are stored in one page of a physical block.
  • the second data programming or write can only be into the second page (P 1 ) 424 b until the n th write to the last page (Pn) 424 n of the block ‘PBK# 1000 ’ 422 .
  • the next data programming the (n+1) th write, must be written to the first page (P 0 ) 434 of a new physical block (PBK# 1012 ) 432 just assigned or allocated according to the WL rules.
  • each entry of the ACPUM 306 is written sequentially in the data area 425 of the page.
  • the other information include at least the following: a bad block indicator 427 , the special logical address 428 issued by the FW for each of the N sets of PLTPPUI and a tracking number 429 for each special logical address.
  • the bad block indicator 427 showing ‘FF’ means a good block.
  • the first special logical address 442 may be ‘0xFFFF0000’.
  • the tracking number (TN) 446 is set to zero for an initial physical block corresponding to each of the first special logical addresses. The tracking number 446 is incremented by one as a new block is assigned or allocated for storing a particular set of PLTPPUI.
  • FIG. 4D is a diagram illustrating an exemplary data structure 440 of the PLTPPUI tracking table 308 of FIG. 3 .
  • the PLTPPUI tracking table 308 contains a plurality of rows representing a plurality of first special logical addresses 442 , one for each of the N sets of PLTPPUI.
  • Each of the N rows contains a physical block number 444 , a tracking number (TN) 446 and highest page number 448 .
  • the first row of the PLTPPUI tracking table 308 corresponds to the example shown in FIG. 4C .
  • an exemplary data structure 450 of a WL/BB tracking table 310 is shown in FIG. 4E .
  • each row is for a second special address 452 of a block of the WL/BB tracking table 310 .
  • the second special address 452 may be ‘0xFFFFFFF0’.
  • An exemplary data structure 460 for storing the WL/BB tracking table in the reserved area of a flash memory is shown in FIG. 4F .
  • the MLC flash memory data programming rules dictate the data to be written to a new page for each update.
  • the spare area stores the block indicator 467 , the second special logical address 452 and tracking number 456 .
  • FIGS. 5A-5E which collectively show a flowchart illustrating an exemplary process 500 of conducting data transfer requests of the flash memory of FIG. 2A in accordance with one embodiment of the present invention.
  • the process 500 is preferably understood in conjunction with previous figures and examples shown in FIGS. 6A-6D .
  • the process 500 is performed by the microcontroller 302 with a flash memory controller program module 304 installed thereon.
  • the process 500 starts in an ‘IDLE’ state until the microcontroller 302 receives a data transfer request from a host (e.g., the host computing device 90 of FIG. 1(A) ) at 502 .
  • a host e.g., the host computing device 90 of FIG. 1(A)
  • LSA logical sector address
  • the received LSA is processed to extract the set, entry, page and sector numbers (see Table 1 for an example) included therein.
  • the process 500 moves to decision 504 .
  • the process 500 reads out the physical block number (PBK#) corresponding to the entry number of the received LSA at 516 before moving to another decision 518 , in which it is determined whether the data transfer request is read or write (i.e., program).
  • PBK# physical block number
  • the process 500 moves to decision 506 .
  • the process 500 checks whether the contents of the page buffer 430 need to be stored. In one implementation, the process 500 checks the sector update flags 432 that correspond to sectors in the page buffer 430 . If any one of the flags 432 has been set to ‘valid’, then the contents of the page buffer 430 must be stored to the corresponding page of the corresponding physical block of the MLC flash memory at 550 (i.e., the decision 506 is ‘yes’). Detailed process of step 550 is shown and described in FIG. 5D . After the contents of the page buffer 430 have been stored, the process 500 sets the ACPUM modification flag (ACPUMF) 412 to a ‘modified’ status at 508 . In other words, the ACPUM 306 has been modified and needs to be stored in the flash memory in the future. Then the process 500 moves to yet another decision 510 .
  • ACPUMF ACPUM modification flag
  • the process 500 moves the decision 510 directly. It is then determined if the ACPUM 306 has been modified. If ‘yes’, the process 500 moves to 580 , in which, the process 500 writes the contents of the ACPUM 306 to one of a plurality of first special logical addresses (e.g., ‘0xFFFF0000’ for PLTPPUI 0 , or ‘0xFFFF0001’ for PLTPPUI 1 , etc.) for storing corresponding set of PLTPPUI in the reserved area of the flash memory.
  • the ACPUM modification flag 412 is reset at the end of 580 .
  • Detailed process of step 580 is shown and described in FIG. 5E .
  • the process 500 loads a corresponding set of PLTPPUI to the ACPUM 306 from the flash memory based on the set number extracted from the received LSA. Once the ACPUM 306 has been loaded, the process 500 reads the physical block number that corresponds to the entry number at 516 before moving to decision 518 . If ‘no’ at decision 510 , the process 500 skips step 580 and goes directly to 514 .
  • the process 500 continues with a sub-process 520 shown in FIG. 5B .
  • the process 500 or sub-process 520 reads data from the corresponding page of the physical block in the flash memory to the page buffer 430 .
  • the corresponding page number is derived from the received LSA, and the physical block number is obtained through the ACPUM 306 for the entry numbers at 516 .
  • the process 500 sends the requested data sector from the page buffer 430 to the host 109 before going back the ‘IDLE’ status waiting for another data transfer request.
  • the process 500 continues with a sub-process 530 shown in FIG. 5C .
  • the process 500 or sub-process 530 moves to decision 532 , in which it is determined whether the contents of the page buffer 430 have been modified. If ‘no’, the process 500 writes received data sector into the page buffer 430 according to the sector number derived from the received LSA, and marks the corresponding sector of the sector update flags 432 to indicate valid data in that particular sector has been written in the page buffer 430 at 538 . The process 500 then moves back to the ‘IDLE’ state waiting for another data transfer request.
  • the process 500 moves to decision 534 . It is determined if the received data sector is in the same entry and page numbers. If ‘yes’, the process 500 writes the received data sector to the page buffer 430 at 538 before going to the ‘IDLE’. If ‘no’ at decision 534 , the process 500 writes the page buffer contents to the corresponding page of the physical block of the flash memory at 550 . Next, the process 500 sets the ACPUM modification flag 412 to a ‘modified’ status at 536 . Next, at 538 , the process 500 writes the received data sector to the page buffer before going back to the ‘IDLE’ state.
  • the process 500 regularly performs a background physical block recycling process so that the blocks containing only stale data can be reused later.
  • the process 500 When the process 500 is in the ‘IDLE’ state, it performs test 540 , in which it is determined if the idle time has exceeded a predefine time period. If ‘yes’, the process 500 performs the background recycling process, which may include issuing a dummy data write request to force the page buffer 430 and/or modified ACPUM 306 to be written to corresponding locations of the flash memory at 542 .
  • the dummy data write/program command may be issued to rewrite some of seldom touched physical blocks, for example, physical blocks used for storing user application or system program modules.
  • step 550 a detailed process of step 550 is shown.
  • the process 500 is at decision 552 , in which it is determined if a new blank physical block is required for storing the contents of the page buffer 430 based on the MLC based flash memory data programming rules.
  • the process 500 writes valid data sectors based on the sector update flags 432 from the page buffer 430 to the page register of the corresponding page of the corresponding physical block of the flash memory at 554 .
  • the process 500 updates the corresponding one of the page usage flags in the ACPUM 306 for the page just written to the flash memory.
  • the process 500 then resets the sector update flags at 558 before returning.
  • the process 500 searches for a blank physical block based on the wear leveling (WL) rule; once found, the process 500 designates it as a new block at 562 . Then, the process 500 updates the ACPUM 306 with the new physical block number for the entry number and keeps the page usage flags the same. It is noted that the entry number is derived from the received LSA. Next, at 566 , the process 500 copies all valid pages with page number less than the current page number from the old to the new physical block if needed. The current page number if the page number derived from the received LSA.
  • WL wear leveling
  • the process 500 writes the valid data sectors based on the sector update flags 432 from the page buffer 430 to the page register of the corresponding page of the new physical block at 568 . Finally if necessary, the process 500 copies all valid pages with page number greater than the current page number from the old to the new physical block at 570 . The process 500 resets the sector update flags at 558 before returning.
  • FIG. 5E is a flowchart illustrating step 580 of the process 500 .
  • the process 500 locates the corresponding physical block in the reserved area of the flash memory using a particular one of the first special logical addresses from the PLTPPUI tracking table 308 .
  • the corresponding physical block is configured to store the contents of the current ACPUM 306 , which is associated with the first special logical address, for example, ‘0xFFFF0000’ for ‘PLTPPUI 0 ’, ‘0xFFFF0001’ for ‘PLTPPUI 1 ’, etc.
  • decision 584 it is determined whether the physical block is full or not.
  • the process 500 writes the contents of the ACPUM 306 to the next page in the physical block at 586 . It is noted that the MLC based flash memory data programming rule dictates that only a new higher page in the same block is allowed to be programmed or written. Then the process 500 updates the PLTPPUI tracking table 308 to reflect that a new page has been written into the physical block by incrementing the highest page count 448 at 588 . Finally, before returning at 590 , the process 500 resets the ACPUM modification flag 412 to a ‘not modified’ status as the contents of the ACPUM 306 have been stored to the flash memory.
  • the process 500 searches a blank physical block as a new physical block (e.g., new physical block (PBK# 1012 ) in FIG. 4C ) in the reserved area of the flash memory based on the WL rule, and the old physical block (e.g. old physical block (PBK# 1000 ) in FIG. 4C ) is sent to a recycling queue for reuse at 592 .
  • the process 500 writes the contents of the ACPUM 306 to the first page (e.g., ‘P 0 ’ of FIG. 4C ) of the new block.
  • the tracking number (TN) is incremented by one.
  • the first special logical address for this particular set of PTLPPUI and the new tracking number (TN) are written into the spare area of the first page.
  • the process 500 then updates the PLTPPUI tracking table 308 with the new physical block number, the tracking number and the highest page number for the current set of PLTPPUI at 598 .
  • the process 500 resets the ACPUM modification flag 412 to a ‘not modified’ status at 590 .
  • FIGS. 6A-6D collectively show a sequence of data write or program requests to demonstrate the exemplary process 500 of FIGS. 5A-5E .
  • the sequence of the data write requests is perform on an exemplary flash memory with four sectors per page, four pages per block, and four entries per set.
  • the logical sector address (LSA) 602 received along with the data write request can be processed in a scheme corresponding to Table 1.
  • two least significant bits of the LSA represent the sector number, next two the page number, next two the entry number, and the remaining bits the set number.
  • PLTPPUI 0 is loaded into ACUPUM 604 , in which the first entry (i.e., entry 0 ) corresponds to physical block ‘PBK# 2 ’ and page usage flags 606 are not set.
  • the ACPUMF 614 is set to a ‘un-modified’ status.
  • the sector data (S 0 ) is written to the first sector of the page buffer 610 and the corresponding flag in the sector update flags 612 is set to a ‘V’ for valid data.
  • the corresponding path is the process 500 is as follows:
  • the corresponding path is the process 500 is as follows:
  • the corresponding path is the process 500 is as follows:
  • the corresponding path is the process 500 is as follows:
  • the corresponding path is the process 500 is as follows:
  • FIG. 6E is a diagram showing a complicated data program or write involving a physical block containing data that prevents another data program operation directly in accordance with the MLC data programming rules.
  • a new blank block (i.e., PBK# 93 ) is allocated and assigned to hold the data in the old block (PBK# 21 ) including updates from the modified page buffer 610 .
  • the corresponding path in the step 550 of the process 500 is as follows:
  • FIGS. 7A-7E which collectively are a flowchart illustrating an exemplary process 700 of initialization of a large capacity flash memory device in accordance with one embodiment of the present invention.
  • the process 700 starts with a power up, for example, a flash memory device is plugged into a host 109 .
  • the process 700 recreates the PLTPPUI tracking table 308 of FIG. 3 from stored N sets of PLTPPUI in the reserved area of the flash memory at 710 .
  • the process 700 validates the stored wear leveling and error correction code information with actual state of all of the physical blocks at steps 730 and 750 , respectively.
  • the process 700 verifies and validates the store PLTPPUI records against actual state of the physical blocks associated with a plurality of first special logical addresses. Finally, the process loads one of the N sets of PLTPPUI into ACPUM 306 at 790 before the initialization ends.
  • the details of steps 710 , 730 , 750 and 770 are shown and described in respective FIGS. 7B , 7 C, 7 D and 7 E.
  • the process 700 initializes contents of the PLTPPUI tracking table 308 to zero and a physical block counter (PBK#) to 0 at 712 .
  • the process 700 reads stored logical address and tracking number (TN) in the spare area of the first page of the physical block ‘PBK#’ at 714 .
  • the process 700 moves to decision 716 , in which it is determined whether the stored logical address is one of the first special addresses for storing PLTPPUI issued by the FW and microcontroller. If ‘no’, the process 700 simply skips this physical block by incrementing the physical block counter ‘PBK#’ by one at 724 .
  • the process 700 moves back to step 714 for processing the next physical block, otherwise the step 710 is done.
  • the process 700 follows the ‘yes’ branch to another decision 718 . It is then determined whether the stored tracking number is newer than the one listed in the PLTPPUI tracking table 308 . For example, the contents in the PLTPPUI tracking table is initialized to zero, any stored tracking number (TN) greater than zero indicates that the stored records are newer. If ‘no’ at decision 718 , the process 700 skips this physical block similar to the ‘no’ branch of decision 716 . However, if ‘yes’ at decision 718 , the process 700 searches and locates a highest written page in this physical block ‘PBK#’ at 720 .
  • the process 700 writes the ‘PBK#’, TN and highest page number in the PLTPPUI tracking table corresponding to the first special logical address. Finally, the process 700 increments the physical block count ‘PBK#’ by one at 724 , then moves to decision 726 to determine either moving back to 714 for processing another physical block or ending the step 710 .
  • step 730 Details of step 730 are shown in FIG. 7C .
  • the process 700 initializes a physical block counter ‘PBK#’ and a group counter ‘m’ to zero.
  • the process 700 loads a ‘m th ’ group of stored WL/BB tracking table into a scratch memory space (e.g., the page buffer 314 of FIG. 3 ) at 734 .
  • the process 700 reads the wear leveling (WL) counter and bad block indicator for the physical block ‘PBK#’ at 736 .
  • the process 700 moves to decision 738 , in which it is determined whether the stored information is in conflict with the physical state of ‘PBK#’. If ‘yes’, the process 700 corrects the conflict information to be consistent with the physical state in the scratch memory at 740 . If ‘no’ at decision 738 , there is no need to correct the conflict.
  • the physical block counter ‘PBK#’ is incremented by one.
  • the process 700 moves to another decision 744 , it is determined if there is additional block in the ‘m th ’ group. If ‘yes’, the process 700 goes back to step 736 reading another WL counters of another physical block to repeat the above steps until the decision 744 becomes ‘no’.
  • the process 700 updates the stored WL/BB tracking table 310 at 746 .
  • decision 748 it is determined if there is any more physical block. If ‘yes’, the process 700 increments the group counter at 749 then goes back to 734 for repeating the above steps for another group. Otherwise, the step 730 returns when the decision 748 is ‘no’.
  • FIG. 7D shows details of step 750 , which is substantially similar to the step 730 .
  • the step 750 validates and corrects the stored error correction code (ECC) for all physical blocks.
  • ECC error correction code
  • the number of group is related to the size of the scratch memory. For example, a 2048-byte page buffer can provide space for holding a group of 1024 WL counters, if each of the WL counters is a 16-bit number. As to the 8-bit ECC, the same 2048-byte page buffer may hold a group of 2048 ECC codes.
  • FIG. 7E shows details of step 770 .
  • the process 700 initializes a logical block counter ‘LBK#’ and a group counter ‘k’ to zero.
  • the process 700 loads a ‘k th ’ group of stored PLTPPUI into a scratch memory space (e.g., a page buffer or other available memory) at 774 .
  • the process 700 reads logical block address from the spare area of the first page of a physical block corresponding to the ‘LBK#’ at 776 .
  • decision 778 it is determined whether there is conflict between the stored PLTPPUI and the physical page usage of the physical block. If ‘yes’, the conflict is corrected with the physical state in the scratch memory at 780 . Otherwise, the process 700 skips step 780 .
  • the process 700 increments the logical block counter ‘LBK#’ by one.
  • the process 700 then moves to another decision 784 , in which it is determined if there is more block in the ‘k th ’ group. If ‘yes’, the process 700 moves back the step 776 repeating the process until the decision 784 becomes ‘no’. Then the process 700 updates the stored PLTPPUI records if the scratch memory has been altered at 786 .
  • decision 788 if there is more logical block, the process 700 follows the ‘yes’ branch to step 789 by incrementing the group counter and repeating the process from step 774 until the decision 788 becomes ‘no’, in which the step 770 ends.
  • Each entry record of PLTPPUI is 18-byte, which is a sum of 2-byte physical block number plus 128-bit (i.e., 16-byte) of page usage flags (i.e., 128 pages per block).
  • Using 2048-byte page buffer as a scratch memory can only hold a group of 113 entry records.
  • peripheral device 100 - 1 in one embodiment is directed to a pocket-sized, press-push, pen-type (i.e., retractable) portable computer peripheral device 100 - 1 that allows positioning plug connector 150 into either a deployed position (indicated in FIG. 1(A) by solid lines) or a retracted position (indicated in FIG. 1(A) by dashed lines).
  • peripheral device 100 - 1 includes an elongated housing 110 having a front portion 111 defining a front end (second) opening 112 , and defines an internal region surrounded by walls that is sized to allow slidable movement of PCBA 120 between the deployed and retracted position, as shown in FIG. 1(A) .
  • Plug connector 150 is fixedly connected to PCBA 120 , which includes several electronic devices (e.g., I/O interface circuit 125 , processing unit 122 and MLC based flash memory chip 123 , all described in detail above), and is disposed to protrude through front opening 112 when moved into the deployed position (e.g., such that plug connector 150 can be plugged into female socket 95 of host computing device 90 , as shown in FIG. 1(A) in solid lines).
  • PCBA 120 includes several electronic devices (e.g., I/O interface circuit 125 , processing unit 122 and MLC based flash memory chip 123 , all described in detail above), and is disposed to protrude through front opening 112 when moved into the deployed position (e.g., such that plug connector 150 can be plugged into female socket 95 of host computing device 90 , as shown in FIG. 1(A) in solid lines).
  • device 100 - 1 includes a locking mechanism for maintaining plug connector in each of the retracted and deployed position.
  • housing 110 defines at least one additional actuator (first) opening 115
  • an actuator button 163 is disposed on PCBA 120 such that it extends through actuator opening 115 .
  • Actuator opening 115 is defined, for example, in a side wall (as shown in FIG. 1(A) ) or a rear end wall of housing 110 .
  • Actuator button 163 includes one or more engaging members (e.g., pawls 164 - 1 and 164 - 2 ), and housing 110 includes one or more corresponding engaging members (e.g., grooves 116 - 1 and 116 - 2 ).
  • pawl 164 - 1 engages groove 116 - 1 , thereby preventing movement of PCBA 120 inside housing 110 until a release operation (e.g., pushing or pulling on button 163 ) is manually performed by a user.
  • a release operation e.g., pushing or pulling on button 163
  • pawl 164 - 2 engages groove 116 - 2 , thereby securing PCBA 120 inside housing 110 .
  • button 163 and the locking mechanism formed by pawls 164 - 1 / 2 and grooves 116 - 1 / 2 form part of a positioning mechanism 160 that also includes at least one resilient member (e.g., springs 170 - 11 and 170 - 12 , shown in FIG. 1(A) , or springs 170 - 21 and 170 - 22 shown in FIG. 1(B) , which discloses a device 100 - 2 that is otherwise identical to device 100 - 1 ) that are provided for biasing plug connector 150 between the deployed position and the retracted position.
  • springs 170 - 11 and 170 - 12 shown in FIG. 1(A)
  • springs 170 - 21 and 170 - 22 shown in FIG. 1(B)
  • springs 170 - 11 and 170 - 12 are coupled at one end to plug connector 150 (e.g., by way of PCBA 120 ) and at the other end to housing 110 . That is, at least one resilient member is connected between plug connector 150 and either to front portion 111 of housing 110 (e.g., as indicated by springs 170 - 11 and 170 - 12 in FIG. 1(A) ) or rear portion 113 (e.g., as indicated by springs 170 - 21 and 170 - 22 in FIG. 1(B) ) of housing 110 , depending on whether the resilient member intended to deploy or retract the plug connector 150 .
  • springs 170 - 11 and 170 - 12 are disposed to perform a spring-loaded retraction function, whereby when plug connector 150 is deployed from housing 110 by pressing and sliding actuating button 163 to stretch springs 170 - 11 and 170 - 12 until pawl 164 - 1 engages locking groove 116 - 1 and plug connector protrudes through front end opening 115 , springs 170 - 11 and 170 - 12 are stretched (indicated by dashed line) such that they store mechanical energy.
  • springs 170 - 21 and 170 - 22 are disposed to perform a spring-loaded deployment function, whereby when plug connector 150 is deployed from housing 110 and pawl 164 is engaged into locking groove 116 - 2 (indicated by dashed lines in FIG. 1 (B)), springs 170 - 21 and 170 - 22 are stretched (indicated by dashed lines in FIG. 1(B) ) such that they store mechanical energy.
  • springs 170 - 21 and 170 - 22 bias plug connector 150 from the deployed position (energy stored) into the retracted position, and springs 170 - 21 and 170 - 22 return to their original shape (indicated by solid lines in FIG. 1(B) ).
  • springs 170 - 11 / 12 FIG. 1(A)
  • 170 - 21 / 22 FIG. 1(B)
  • the present invention provides a computer peripheral device having a desirable spring-loaded deploying/retracting feature that protects plug connector 150 without the need for a separate cap.
  • Each of these devices includes a sliding rack which is enclosed inside a housing structure in which a USB plug connector could be extended out or retracted in by sliding a slide button either on the top or on the side of the housing structure, or by pressing the rear push button of the housing in accordance with the specific embodiments set forth below.
  • FIGS. 8(A) and 8(B) are perspective top views showing a pocket-sized, pen-type (i.e., retractable) portable computer peripheral device 100 A having a retractable Universal Serial Bus (USB) plug connector 150 A according to a first specific embodiment of the present invention.
  • the flash memory device is a slide MLC USB flash drive including the MLC based flash memory chip described in detail above.
  • USB plug connector 150 A is retracted through a front opening 112 A defined by elongated housing 110 A such that connector 150 A is safely disposed inside housing 110 A.
  • a press-push button 163 A is integrally connected to a positioning member (not shown, described below) and is partially exposed through a slot 115 A to facilitate manual movement from the fully retracted (first) position shown in FIG. 8(A) , to the fully deployed (second) position shown in FIG. 8(B) .
  • plug connector 150 A is deployed from housing 110 A by pressing press-push button 163 A in the direction of arrow P, which releases mechanical energy stored in a pair of linear springs (described below), causing button 163 A to slide forward along slot 115 A (i.e., in the direction of arrow S in FIG. 8(A) ).
  • peripheral device 100 A When plug connector 150 A is deployed/exposed outside housing 110 A, peripheral device 100 A can be plugged into a host computer and function in the programming, data retrieving, and data resetting modes described above. Once the desired operations are completed, plug connector 150 A is retracted into housing 110 A by pressing press-push button 163 A and manually pulling backward, which causes button 163 A to retract backward along slot 115 A (i.e., in the direction opposite to arrow S in FIG. 8(A) ) to load the linear springs for a future spring-loaded deployment.
  • FIG. 9 is an exploded perspective view showing device 100 A in additional detail.
  • Device 100 A generally includes a rectangular two-part housing 110 A, a printed circuit board assembly (PCBA) 120 A that is mounted inside of housing 110 A, a manual (slide) positioning member 160 A mounted on PCBA 120 A, and a pair of metal flat springs 170 A- 1 and 170 A- 2 .
  • PCBA printed circuit board assembly
  • two-part molded plastic housing 110 A includes a lower (first) portion 110 A- 1 and an upper (second) portion 110 A- 2 .
  • lower portion 110 A- 1 includes a lower wall 114 A- 1 , first side wall portions 117 A- 11 and 117 A- 12 , a rear wall portion 113 A- 1 , and front wall portions 111 A- 11 and 111 A- 12 defining a front opening portion 112 A- 1 .
  • Connecting tabs 118 -A 1 protrude from inside surfaces of side walls 117 A- 11 and 117 A- 12 .
  • Slide tracks e.g., slide track 119 A- 1 ) are defined in lower wall 114 A- 1 .
  • upper portion 110 A- 1 includes a relatively wide, elongated upper wall that is divided into a front upper wall portion 114 A- 21 and a rear upper wall portion 114 A- 22 that are separated by a slot 115 A.
  • Extending downward from the upper wall are side walls including outer side wall portions 117 A- 21 and 117 A- 22 , front wall portions 111 A- 21 and 111 A- 22 that define front opening portion 112 A- 2 , and a rear outer wall 113 A- 2 .
  • Connecting slots 118 A- 2 are defined on inner side walls 117 A- 21 and 117 A- 22 .
  • Retracted lock grooves 116 A- 1 and deployed lock grooves 116 A- 2 are defined in an inside surface of front upper wall portion 114 A- 21 / 22 .
  • a sliding rack assembly includes PCBA 120 A, a USB plug connector 150 A, a slide rack (positioning member) 160 A, and two linear springs 170 A- 1 and 170 A- 2 .
  • PCBA 120 A includes a printed circuit board (PCB or card) 121 A and USB plug (metal) connector 150 A that is attached to a front end of PCB 121 A using known techniques such that PCB 121 A is approximately aligned centered to USB metal connector 150 A.
  • PCB 121 A includes several ICs (e.g., a controller or processing unit 122 A and flash memory 123 A) disposed thereon. The ICs are electronically connected together and to connector 150 A using known techniques.
  • positioning member 160 A includes a base portion 161 A and a flexible wall 162 A that is connected to base portion 161 A such that flexible wall 162 A is resiliently bendable relative to base portion 161 A in the manner described below.
  • Press-push button 163 A extends upward from flat flexible wall 162 A.
  • Locking tabs (first locking structures) 164 A also extend upward from flat flexible surface 162 A next to button 163 A.
  • First and second slide rails 167 A- 1 and 167 A- 2 are fixedly connected to and extend substantially perpendicular to base portion 161 A.
  • Elongated grooves 168 A- 1 and 168 A- 2 are respectively formed on slide rails 167 A- 1 and 167 A- 2 , and are sized to receive linear springs 170 A- 1 and 170 A- 2 .
  • PCBA 120 A (with connector 150 A already attached) is mounted onto positioning member 160 A with plug connector 150 A extending from the front thereof, and then PCBA 120 A is pressed against positioning member 160 A until locking tabs not shown snap into cut-outs provided on PCB 121 A.
  • Linear springs 170 A- 1 and 170 A- 2 are then slid into corresponding grooves 168 A- 1 and 168 A- 2 such that one end of each linear spring is engaged into a locking hole (not shown) defined in positioning member 160 A.
  • the assembly is then mounted into lower housing 110 A- 1 such that slide rails 167 A- 1 and 167 A- 2 are slidably engaged in corresponding slide tracks 119 A- 1 , and then upper mounting 110 A- 2 is mounted over the assembly such that a second end of each linear spring 170 A- 1 and 170 A- 2 is engaged into a locking hole (not shown) defined in upper housing 110 A- 2 , and such that a portion of press-push button 163 A (which extends from flat flexible wall 162 A) is received in slot 115 A.
  • side walls (e.g., side wall 117 A- 21 ) of upper housing portion 110 A- 2 are aligned to be received by corresponding side walls (e.g., side walls 117 A- 11 and 117 A- 12 ) of lower housing portion 110 A- 1 , and then pressed until locking tabs 118 A- 1 are snapped into slots 118 A- 2 .
  • ultrasonic welding may be used in place of the snap-coupling mechanism described above to secure housing portions 110 A- 1 and 110 A- 2 .
  • FIGS. 10-1 and 10 - 2 are partial perspective views depicting peripheral device 100 A in the deployed and retracted positions with side walls of housing 110 A removed for illustrative purposes
  • FIGS. 10(A) to 10(C) are simplified cross-sectional side views showing peripheral device 100 A during a deployment operation.
  • plug connector 150 A is disposed inside housing 110 A
  • protrusions (lock tabs) 164 A- 1 are engaged in rear lock slots 116 A- 1
  • springs 170 A- 1 and 170 A- 2 are subjected to stretch/extension.
  • pressing down button 163 A releases protrusions 164 A- 1 from rear slot locks 116 A- 1 , causing the sliding rack assembly to be propelled forward (i.e., in the direction of arrow S) by linear springs 170 A- 1 and 170 - 2 .
  • the plug connector 150 A is thus pushed into its deployed position by way of the spring-loaded mechanism such that it extends through front end opening 112 A, and is held in the deployed position by front protrusions 164 A- 2 engaging in front lock slots 116 A- 2 .
  • button 163 A is free to move forward due to the clearance provided by slot 115 A. Subsequent return to the retracted position requires pressing button 163 A downward and manually sliding the assembly back into the retracted position.
  • connector 150 A is sprung forward or backward depending on the coupling orientation of springs 170 A- 1 and 170 A- 2 to positioning member 160 A and housing 100 A.
  • the sliding rack assembly is sprung back to retract the USB plug connector in the housing when pressing the actuating button downward when the plug connector is in the deployed position.
  • the press/push switch (or slide button) mechanism is located on the side of the flash memory device, the top, or the rear; and relies upon the resilient properties of the sliding rack and springs to create a smooth, locking mechanism for the extension or retraction of the USB plug.
  • the slide button must first be depressed inwards, towards the body of flash memory drive, in order for the sliding rack to move between its two locked positions along slide tracks.
  • the extended (front) lock slot/groove and the retracted (rear) lock slot/groove serve to lock the button (top, side, or rear) in either the extended position or retracted position, respectively.
  • FIGS. 11(A) and 11(B) are partial exploded perspective and perspective views, respectively, showing a sliding rack assembly according to an alternative embodiment in which springs 170 A- 11 and 170 A- 12 are connected by way of a cross-bar 175 A, and the resulting spring assembly is mounted onto sliding rack 160 A- 1 in a single piece.
  • sliding rack 160 A- 1 is essentially identical to sliding rack 160 A (described above), but includes rear slots 169 A- 1 for receiving cross-bar 175 A, as indicated by the assembly in FIG. 11(B) .
  • This arrangement simplifies the assembly process relative to the two spring embodiment (described above), thereby reducing manufacturing costs.
  • FIGS. 12(A) and 12(B) are perspective top views showing a retractable portable computer peripheral device 100 B having a retractable USB plug connector 150 B according to another specific embodiment of the present invention. Similar to the first embodiment (described above), in a fully retracted position, USB plug connector 150 B is retracted through a front opening 112 B defined by elongated housing 110 B, a press-push button 163 B is integrally connected to a positioning member (not shown, described below) and is partially exposed through a slot 115 B to facilitate manual movement from the fully retracted (first) position shown in FIG. 12(A) , to the fully deployed (second) position shown in FIG. 12(B) .
  • USB plug connector 150 B is biased by pair of linear springs that are disposed in housing 110 B such that the resilient member biases plug connector 150 B from the deployed position shown in FIG. 12(B) to the retracted position shown in FIG. 12(A) . That is, to deploy USB plug connector 150 B for use, a user manually presses press-push button 163 B into housing 110 B (i.e., in the direction P indicated by dark arrow in FIG. 12 (A)), and then pushes (slides) button 163 B along slot 115 B toward the front end of housing 110 B (i.e., in the direction of arrow S in FIG. 12(A) ).
  • plug connector 150 B This press-push operation causes plug connector 150 B to emerge from front end opening 112 B such that peripheral device 100 B can be plugged into a host computer and function in the programming, data retrieving, and data resetting modes described above.
  • plug connector 150 B is retracted into housing 110 B by pressing press-push button 163 B, which releases mechanical energy stored in a pair of linear springs (described below) and causes button 163 B to slide backward along slot 115 B (i.e., in the direction opposite to arrow S in FIG. 12(A) ).
  • FIG. 13 is an exploded perspective view showing device 100 B in additional detail.
  • Device 100 B generally includes a rectangular two-part housing 110 B including a lower portion 110 B- 1 and an upper portion 110 B- 2 , and a sliding rack assembly includes a PCBA 120 B and USB plug connector 150 B mounted thereon, a slide rack 160 B, and two linear springs 170 B- 1 and 170 B- 2 that is mounted inside of housing 110 B.
  • Housing 110 B is similar to that described in the first embodiment, and differs only in that upper wall portion 114 B- 2 defines retracted lock grooves 116 B- 1 and deployed lock grooves 116 B- 2 at opposing ends of slot 115 B. Referring to the center of FIG.
  • positioning member 160 B includes a base portion 161 B and a flexible wall 162 B disposed in a manner similar to that described above.
  • Press-push button 163 B is somewhat more oblong than in the first embodiment, and includes locking tabs 164 B disposed on each side thereof.
  • elongated grooves 168 B- 1 and 168 B- 2 are respectively formed on slide rails 167 B- 1 and 167 B- 2 , and are sized to receive linear springs 170 B- 1 and 170 B- 2 , and assembly of device 100 B is substantially the same as that described above for the first embodiment.
  • FIGS. 14-1 and 14 - 2 are partial perspective views depicting peripheral device 100 B in the deployed and retracted positions with side walls of housing 110 B removed for illustrative purposes
  • FIGS. 14(A) to 14(C) are simplified cross-sectional side views showing peripheral device 100 B during a spring-loaded retraction operation.
  • plug connector 150 B is disposed outside housing 110 B
  • lock tabs 164 B are engaged in front lock slots 116 B- 2
  • springs 170 B- 1 and 170 B- 2 are subjected to stretch/extension.
  • FIG. 14-1 and 14 - 2 are partial perspective views depicting peripheral device 100 B in the deployed and retracted positions with side walls of housing 110 B removed for illustrative purposes
  • FIGS. 14(A) to 14(C) are simplified cross-sectional side views showing peripheral device 100 B during a spring-loaded retraction operation.
  • pressing down button 163 B releases protrusions 164 B from front slot locks 116 B- 2 , causing the sliding rack assembly to be propelled backward (i.e., in the opposite direction of arrow S) by linear springs 170 B- 1 and 170 - 2 .
  • the plug connector 150 B is thus pulled into its retracted position by way of the spring-loaded mechanism such that it is disposed inside housing 110 B, and is held in the retracted position by locking protrusions 164 B engaged in rear lock slots 116 B- 1 . Subsequent return to the deployed position requires pressing button 163 B downward and manually sliding the assembly forward into the deployed position.
  • FIGS. 15(A) and 15(B) are perspective top views showing a portable computer peripheral device 100 C having a retractable USB plug connector 150 C and a side-mounted spring-pressed button 163 C according to another specific embodiment of the present invention. Similar to the first embodiment (described above), in a fully retracted position, USB plug connector 150 C is retracted through a front opening 112 C defined by elongated housing 110 C, and press-push button 163 C is integrally connected to a positioning member (not shown, described below) and is partially exposed through a slot 115 C to facilitate manual movement from the fully retracted (first) position shown in FIG. 15(A) , to the fully deployed (second) position shown in FIG. 15(B) .
  • a positioning member not shown, described below
  • a pair of linear springs disposed in housing 110 C bias plug connector 150 C from the retracted position shown in FIG. 15(A) to the deployed position shown in FIG. 15(B) .
  • the retracting operation is performed by pressing press-push button 163 C, which is extends through a slot 115 C defined in a side wall of housing 110 C, and manually pulling button 163 C backward along slot 115 C (i.e., in the direction opposite to arrow S in FIG. 15(A) ) to load the linear springs for a future spring-loaded deployment.
  • FIG. 16 is an exploded perspective view showing a spring-loaded sliding rack assembly of device 100 C.
  • the assembly includes a PCBA 120 C with USB plug connector 150 C mounted thereon, a two-part carrier (slide rack) 160 C including a body 161 C and a cover (upper wall) 162 C, and two linear springs 170 C- 1 and 170 C- 2 .
  • press-push button 163 C extends from a side wall of body 161 C.
  • PCBA 120 C is mounted into body 161 C and then secured by cover 162 C.
  • the rear ends of springs 170 C- 1 and 170 C- 2 are then attached to structures 165 C located on the top and bottom sides of body 161 C.
  • assembly 160 C is then mounted between lower housing 110 C- 1 and upper housing 110 C- 2 such that front ends of the springs (e.g., spring 170 C- 2 ) are attached to corresponding structures (e.g., structure 116 C- 1 ) disposed on the inside surfaces of the housing portions, and such that press-push button 163 C is disposed in a slot formed by slot portions 115 C- 1 and 115 C- 2 .
  • springs e.g., spring 170 C- 2
  • corresponding structures e.g., structure 116 C- 1
  • FIGS. 18(A) and 18(B) are perspective top views showing a portable computer peripheral device 100 D having a retractable USB plug connector 150 D and a side-mounted spring-pressed button 163 D according to another specific embodiment of the present invention. Similar to the embodiment described above with reference to FIGS. 15(A) to 17 , in a fully retracted position, USB plug connector 150 D is retracted through a front opening 112 D defined by elongated housing 110 D, and press-push button 163 D is integrally connected to a positioning member (not shown, described below) and is partially exposed through a slot 115 D to facilitate manual movement from the fully retracted (first) position shown in FIG. 18(A) , to the fully deployed (second) position shown in FIG. 18(B) .
  • a positioning member not shown, described below
  • device 100 D includes a pair of linear springs disposed in housing 110 D that bias plug connector 150 D from the deployed position shown in FIG. 18(B) to the retracted position shown in FIG. 18(A) .
  • the deploying operation is performed by pressing press-push button 163 D, which extends through a slot 115 D defined in a side wall of housing 110 D, and manually pushing forward, which causes button 163 D to slide along slot 115 D (i.e., in the direction of arrow S in FIG. 18(A) ) to load the linear springs for a future spring-loaded retraction.
  • FIG. 19 is an exploded perspective view showing device 100 D in additional detail.
  • a sliding rack assembly includes a PCBA 120 D with USB plug connector 150 D mounted thereon, a two-part carrier (slide rack) 160 D including a body 161 D and a cover (upper wall) 162 D, and two linear springs 170 D- 1 and 170 D- 2 , with press-push button 163 D extending from a side wall of body 161 D.
  • PCBA 120 D is mounted into body 161 D and then secured by cover 162 D in the manner described above, but the front ends of springs 170 D- 1 and 170 D- 2 are then attached to structures 165 D- 1 and 165 D- 2 located on cover 162 D and the bottom side of body 161 D.
  • the assembly is then mounted between lower housing 110 D- 1 and upper housing 110 D- 2 such that rear ends of the springs are attached to corresponding structures (e.g., structure 116 D- 1 ) disposed on the inside surfaces of the housing portions, and such that press-push button 163 D is disposed in a slot formed by slot portions 115 D- 1 and 115 D- 2 .
  • FIGS. 20(A) and 20(B) are perspective top views showing a portable computer peripheral device 100 E having a retractable USB plug connector 150 E and a rear-mounted spring-pressed button 163 E according to another specific embodiment of the present invention. Similar to the embodiments described above, in a fully retracted position, USB plug connector 150 E is retracted through a front opening 112 E defined by elongated housing 110 E, and press-push button 163 E is integrally connected to a positioning member (not shown, described below) and is partially exposed through a rear opening 115 E to facilitate manual movement from the fully retracted (first) position shown in FIG. 20(A) , to the fully deployed (second) position shown in FIG. 20(B) .
  • a positioning member not shown, described below
  • device 100 E includes at least one linear springs disposed in housing 110 E that biases plug connector 150 E from the deployed position shown in FIG. 20(B) to the retracted position shown in FIG. 20(A) .
  • the deploying operation is performed by pressing press-push button 163 E, which extends through a rear opening 115 E defined in housing 110 E, and manually pushing forward, which causes button 163 E to move toward housing 110 E (i.e., in the direction of arrow S in FIG. 15(A) ) to load the linear spring(s) for a future spring-loaded retraction.
  • FIG. 21 is an exploded perspective view showing a spring-loaded sliding rack assembly of device 100 E.
  • the assembly includes a PCBA 120 E with USB plug connector 150 E mounted thereon, one linear springs 170 E, and a two-part carrier (slide rack) including a lower carrier portion 160 E- 1 and an upper carrier portion 160 E- 2 , which respectively include lower button portion 163 E- 1 and upper button portion 163 E- 2 .
  • PCBA 120 C is mounted between lower carrier portion 160 E- 1 and upper carrier portion 160 E- 2 , which are then snap-coupled in a manner similar to that used to connect housing portions in previously described embodiments.
  • the front end of spring 170 E is then attached to a structure similar to that described above that is disposed on the lower side (not shown) of lower carrier portion 160 E- 1 .
  • assembly 160 E is then mounted between lower housing 110 E- 1 and upper housing 110 E- 2 such that rear end of the spring (not shown, disposed on the lower side of assembly 160 E) is attached to structure 116 E- 1 disposed on the inside surfaces of lower housing portion 110 E- 1 , and such that press-push button 163 E is disposed in an opening formed by rear opening portions 115 E- 1 and 115 E- 2 .
  • FIGS. 23(A) and 23(B) are perspective top views showing a portable computer peripheral device 100 F having a retractable USB plug connector 150 F and a rear-mounted spring-pressed button 163 F according to another specific embodiment of the present invention. Similar to the embodiments described above, a deploying operation is performed by pressing press-push button 163 F, which extends through a rear opening 115 F defined in housing 110 F, and manually pushing forward, which causes button 163 F to move toward housing 110 F (i.e., in the direction of arrow S in FIG. 15(A) ) to load the linear spring(s) for a future spring-loaded retraction.
  • FIGS. 24(A) to 24(C) are exploded perspective views showing alternatives PCBA 120 F to 120 H and alternative USB plug connectors 150 F to 150 H according to alternative embodiments of the invention.
  • a sliding rack assembly includes a PCBA (e.g., 120 A; see FIG. 9 ), a USB plug connector (e.g., connector 150 A; see FIG. 9 ), a slide rack (e.g., positioning member 160 A; see FIG. 9 ), and two linear springs (e.g., springs 170 A- 1 and 170 A- 2 ; see FIG. 9 ). Similar arrangements are described above with reference to the various additional embodiments.
  • PCBAs 120 A-E and USB plug connectors 150 A-E of these various embodiments can be replaced by alternative PCBAs 120 F to 120 H and connectors 150 F to 150 H shown in FIGS. 24(A) to 24(C) .
  • FIG. 24(A) shows a Chip-On-Board (COB) PCBA 120 F and a standard metal USB plug 150 F, wherein COB PCBA 120 F includes the memory, I/O and processor circuits described above that are mounted in chip (i.e., unpackaged) form onto a printed circuit board substrate, and then overmolded with a suitable plastic material.
  • COB PCBA 120 F includes the memory, I/O and processor circuits described above that are mounted in chip (i.e., unpackaged) form onto a printed circuit board substrate, and then overmolded with a suitable plastic material.
  • FIG. 24(B) shows a Slim Printed Circuit Board Assembly (Slim PCBA) 120 G and a modified metal USB plug shell 150 G
  • FIG. 24(C) shows a Chip-On-Board (COB) PCBA 120 H and a COB carrier 150 H.
  • Slim PCBA Slim Printed Circuit Board Assembly
  • COB Chip-On-Board
  • top and bottom housings in the above-described embodiments include ultrasonic welding using known techniques.
  • the materials of the top and bottom housing to use in this process may be made of thermoplastic materials such as Acrylonitrile Butadiene Styrene (ABS), ABS/polycarbonate alloy, polyester, Polyvinyl chloride (PVC), Nylon and Nylon with fiberglass.
  • Ultrasonic bonders are applied, e.g., on the flat edges of the side walls of the bottom housing to serve as the initial melting point as an ultrasonic wave from welding machine generates high frequency vibration between the ultrasonic bonder and the top housing.
  • Embodiments of the present invention also relate to an apparatus for performing the operations herein.
  • This apparatus may be specially constructed for the required purposes, or it may comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer.
  • a computer program may be stored in a computer readable medium.
  • a machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer).
  • a machine-readable (e.g., computer-readable) medium includes a machine (e.g., a computer) readable storage medium (e.g., read only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices, etc.), a machine (e.g., computer) readable transmission medium (electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.)), etc.
  • USB connector has been shown and described, other types of connectors such as a Secure Digital (SD) interface circuit, a Micro SD interface circuit, a Multi Media Card (MMC) interface circuit, a Compact Flash (CF) interface circuit, a Memory Stick (MS) interface circuit, a PCI-Express interface circuit, an Integrated Drive Electronics (IDE) interface circuit, a Serial Advanced technology Attachment (SATA) interface circuit, an external SATA interface circuit, a Radio Frequency Identification (RFID) interface circuit, a fiber channel interface circuit, and an optical connection interface circuit may be used to achieve the same function.
  • SD Secure Digital
  • MMC Multi Media Card
  • CF Compact Flash
  • MS Memory Stick
  • PCI-Express interface circuit Integrated Drive Electronics (IDE) interface circuit
  • SATA Serial Advanced technology Attachment
  • RFID Radio Frequency Identification

Abstract

A pen-type computer peripheral device includes an elongated housing containing a PCBA having a plug connector. The PCBA is secured to a positioning member that is actuated by way of a press-push button that is exposed through a slot defined in a wall of the housing. A spring-loaded mechanism includes a spring and a locking mechanism that locks the connector in a retracted position and a deployed position, and the spring biases the connector from the retracted position to the deployed position, or vice versa.

Description

RELATED APPLICATIONS
This application is a continuation-in-part (CIP) of co-pending U.S. patent application for “Methods and Systems of Managing Memory Addresses in a Large Capacity Multi-Level Cell (MLC) based flash memory device”, Ser. No. 12/025,706, filed Feb. 4, 2008.
This application is also a (CIP) of co-pending U.S. patent application for “Press/Push USB Flash Drive with Deploying and Retracting Functionalities with Elasticity Material and Fingerprint Verification Capability”, Ser. No. 11/845,747, filed Aug. 27, 2007.
This application is also a CIP of U.S. patent application for “Multi-Level Cell (MLC) Slide Flash Memory Device”, Ser. No. 12/050,748, filed Mar. 18, 2008 now U.S. Pat. No.7,628,622.
This application is a CIP of U.S. patent application for “MLC COB USB Flash Memory Device with Sliding Plug Connector”, Ser. No. 12/171,194, filed Jul. 10, 2008 now U.S. Pat. No. 7,771,215.
This application is also a CIP of U.S. patent application for “Universal Serial Bus Flash Drive with Deploying and Retracting Functionalities”, Ser. No. 11/682,261 filed Mar. 5, 2007 now U.S. Pat. No. 7,420,803.
This application is also a CIP of co-pending U.S. patent application for “Pen-like Universal Serial Bus (USB) Flash Drive with Deploying and Retracting Functionalities”, Ser. No. 11/950,190, filed Dec. 4, 2007.
This application is also a CIP of U.S. patent application for “Flash Memory Controller For Electronic Data Flash Card”, Ser. No. 11/466,759, filed Aug. 23, 2006 ; now U.S. Pat. No. 7,702,831 which is a continuation-in-part of U.S. Patent application for “ELECTRONIC DATA FLASH CARD WITH FINGERPRINT VERIFICATION CAPABILITY”, U.S. application Ser. No. 11/458,987, filed Jul. 20, 2006 now U.S. Pat. No. 7,690,030.
This application relates to U.S. Pat. No. 7,004,780, filed on May 13, 2004, and entitled “PORTABLE COMPUTER PERIPHERAL APPARATUS WITH RETRACTABLE PLUG CONNECTOR”.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention relates to flash memory devices, more particularly to systems and methods of managing memory addresses in a large capacity multi-level cell (MLC) based flash memory device.
2. Description of the Related Art
As flash memory technology becomes more advanced, flash memory is replacing traditional magnetic disks as storage media for mobile systems. Flash memory has significant advantages over floppy disks or magnetic hard disks such as having high-G resistance and low power dissipation. Because of the smaller physical size of flash memory, they are also more conducive to mobile systems. Accordingly, the flash memory trend has been growing because of its compatibility with mobile systems and low-power feature. However, advances in flash technology have created a greater variety of flash memory device types that vary for reasons of performance, cost and capacity. As such, a problem arises when mobile systems that are designed for one type of flash memory are constructed using another, incompatible type of flash memory.
New generation personal computer (PC) card technologies have been developed that combine flash memory with architecture that is compatible with the Universal Serial Bus (USB) standard. This has further fueled the flash memory trend because the USB standard is easy to implement and is popular with PC users. In addition, flash memory is replacing floppy disks because flash memory provides higher storage capacity and faster access speeds than floppy drives.
In addition to the limitations introduced by the USB standard, there are inherent limitations with flash memory. First, flash memory sectors that have already been programmed must be erased before being reprogrammed. Also, flash memory sectors have a limited life span; i.e., they can be erased only a limited number of times before failure. Accordingly, flash memory access is slow due to the erase-before-write nature and ongoing erasing will damage the flash memory sectors over time.
To address the speed problems with USB-standard flash memory, hardware and firmware utilize existing small computer systems interface (SCSI) protocols so that flash memory can function as mass-storage devices similarly to magnetic hard disks. SCSI protocols have been used in USB-standard mass-storage devices long before flash memory devices have been widely adopted as storage media. Accordingly, the USB standard has incorporated traditional SCSI protocols to manage flash memory.
As the demands for larger capacity storage increase, the flash memory device needs to keep up. Instead of using single-level cell flash memory, which stores one-bit of information per cell, multi-level cell (MLC) flash memory, or hybrid flash memory, which is assembled partially SLC and partially MLC, is used. The MLC flash memory allows at least two bits per cell. However, there are a number of problems associated with the MLC flash memory. First, the MLC flash memory has a low reliability. Secondly, the MLC flash memory data programming rules require writing to an ascending page in the same block or writing to a blank new page if there are data existed in the original page. Finally, a larger capacity requires a large logical-to-physical address look up table. In the prior art approach, the size look up table is in direct portion with the capacity of the flash memory. This creates a huge problem not only to the cost, but also to the physical size of the flash memory device. Furthermore, the traditional usage of the flash memory devices is generally in a very clean and relatively mild environment, thus the packaging design such as enclosure of the flash memory device is not suitable for hostile environment such as military and heavy industrial applications.
Modern portable computer peripheral devices for storing confidential data take many mechanical forms. In most cases, such peripheral devices have been reduced to “pocket size”, meaning that they can literally be carried in a user's pocket in the same manner as a wallet or set of keys. One example of particular interest is a pen-type flash device having a USB connector plug that can be connected to a USB port of a standard computer. The USB plug connector is protected by a removable cover when not in use. A problem with convention pen-type peripheral devices is that the removable cover can become inadvertently lost while the device is in use, thereby leaving the USB plug connector exposed to damage or contamination.
An alternative to conventional pen-type peripheral devices is a “press-push” memory device, which provides a connector that retracts into a housing of the memory device for protection when not in use. A device with a retractable connector generally has a button feature on the outside of its housing that allows a user to manually slide the connector between a retracted position and an extended (deployed) position. In the extended position, the connector extends through an opening in the housing so that it may be plugged into a receptacle. In the retracted position, the connector is contained within the housing and is protected by the housing, thereby obviating the need for a separate cap that can be lost.
Although “press-push” memory devices avoid the problems of conventional pen-type peripheral devices, e.g., by avoiding the need for a separate cap, the molded plastic used to produce these devices can become worn over a relatively short amount of time, leading to undesirable resistance or jamming that prevents the desired retraction of the connector when not in use.
Therefore, it would be desirable to have improved methods and systems of managing memory addresses in a large capacity multi-level cell (MLC) flash memory device. What is also needed is a retractable portable computer peripheral apparatus for housing a large capacity multi-level cell (MLC) flash memory device that overcomes the problems associated with conventional press-push memory devices.
SUMMARY OF THE INVENTION
Methods and systems of managing memory addresses in a large capacity multi-level cell (MLC) based flash memory device are disclosed. According to one aspect of the present invention, a MLC based flash memory device comprises a card body with a processing unit, an input/output (I/O) circuit and at least one MLC flash memory chip mounted thereon. The card body may comprise a print circuit board (PCB). The I/O circuits generally are coupled to the processing unit in form of an integrated circuit. The processing unit manages data transfers between a host computing device (e.g., personal computer, consumer electronic device) and the at least one flash memory chip. The MLC based flash memory chip is configured to provide data storage for the host.
The present invention is particularly directed to a retractable portable computer peripheral device (apparatus) for safely transporting a MLC based flash memory chip (device) in which a plug connector (e.g., a USB plug connector) is electrically connected to the MLC based flash memory device and is manually retracted inside or deployed through a front end (second) opening of an elongated housing by way of a spring-loaded mechanism that biases the plug connector either into or out of the housing. The spring-loaded mechanism includes an actuating button that protrudes through an actuator (first) opening defined in the housing, and a locking structure that secures the plug connector in the retracted and deployed positions. A resilient member, preferably a linear spring, is coupled to the plug connector and either to a front portion or a rear portion of the housing, depending on whether the spring is used to deploy or retract the plug connector. For example, in a spring-loaded retraction embodiment, a linear spring is connected between the plug connector and the rear housing portion, whereby the plug connector is deployed from the housing by manually pressing and sliding the actuating button to stretch a linear spring until the lock mechanism is engaged, and subsequent retraction of the connector into the housing enclosure is performed by releasing the spring-loaded mechanism (e.g., by re-pressing the actuating button), whereby the mechanical energy stored in the linear spring biases the connector back inside the housing. Conversely, in a spring-loaded extension embodiment, the linear spring is connected between the plug connector and the front housing portion such that the spring is stretched in the retracted position, and subsequent release of the spring-loaded mechanism causes the linear spring to bias the connector out of the housing into its deployed position. By utilizing linear springs to retract or deploy the plug connector in this manner, the present invention provides a computer peripheral device having a desirable spring-loaded deploying/retracting feature that protects the plug connector without the need for a separate cap, and also serves to reduce wear that can lead to jamming by maintaining the plug connector in a proper orientation relative to the housing during the deploying and retracting operation.
In according with several disclosed specific embodiments, the spring-loaded mechanism includes an assembly formed by a sliding rack (positioning member) and a printed circuit board assembly (PCBA), where the plug connector is fixed connected to a front end of the PCBA, the MLC based flash memory chip is mounted on the PCBA, and the actuating button is integrally formed on or attached to the sliding rack. The deployed/retracted position of the assembly inside an elongate housing is controlled by a locking mechanism controlled by the actuating button and a corresponding locking member disposed on the housing. In one set of specific embodiments, the button extends through a slot defined in a side wall of the housing such that, when a user manually presses and slides the press-push button along the slot, the user is able to move the plug connector between a retracted position, in which the plug connector is positioned inside of the housing, and a deployed position in which the plug connector extends through the opening and is exposed outside of the housing. In another set of embodiments, the button extends through a rear opening defined in the rear portion of the housing such that the user manually presses or pulls the button to move the plug connector between the retracted and deployed positions. In both of these types of apparatus, a spring is connected between the sliding rack and the housing to bias the assembly either into the deployed position or into the retracted position.
In accordance with some of the disclosed specific embodiments, the sliding rack includes a base portion and a pair of side walls fixedly attached to the base portion, and two or more linear springs are disposed on opposing sides of the positioning member such that the linear springs are parallel to and in contact with the side walls. In one or more specific embodiments, the linear springs are slidably received inside elongated side grooves provided on the side walls. With this arrangement, the linear springs are maintained in a planar region defined by the side grooves and/or a spaced between the side walls of the slide rack and opposing side walls of the housing, thereby providing reliable and long-lasting spring-loaded functionality while requiring a minimum of space. Further, by disposing the linear springs on opposite sides of the slide rack, the slide rack is biased into a central position within the housing, thereby reducing wear caused by repeated retraction/deployment operations.
In accordance with another aspect of the present invention employed in some of the embodiments disclosed herein, a flexible wall is disposed on the base portion of the sliding rack, and a press-push-type actuating button is integrally disposed on the flexible wall such that the actuating button extends through a slot defined in the housing wall. The flexible wall is supported by the sliding rack in the housing such that when the press-push button is manually pressed into the housing, the slide rails (side walls) of the sliding rack contact and slide along an inside surface of the housing wall, thus allowing the flexible wall to bend or otherwise resiliently deflect into the housing. When the press-push button is subsequently released, the flexible wall resiliently returns the press-push button to its original (raised) position. This resilient bending is utilized to engage and disengage the locking structure (e.g., a locking tab) formed on the flexible wall from corresponding locking structures (e.g., lock grooves) formed on the housing wall.
BRIEF DESCRIPTION OF THE DRAWING
Other features and advantages of the present invention will become apparent in the following detailed description of the preferred embodiment with reference to the accompanying drawings, of which:
FIGS. 1(A) and 1(B) are simplified diagrams showing electronic apparatus representing simplified embodiments of the present invention;
FIG. 2A is a diagram depicting a data structure of an exemplary large capacity flash memory, according one embodiment of the present invention;
FIG. 2B is a diagram showing an exemplary scheme for partitioning a logical sector address in accordance with one embodiment of the present invention;
FIG. 3 is a simplified block diagram illustrating salient components of an exemplary processing unit of each of the electronic flash memory devices of FIGS. 1(A) and 1(B), according to an embodiment of the present invention;
FIGS. 4A-4F collectively show exemplary data structures used for managing memory addresses of the flash memory of FIG. 2A in accordance with one embodiment of the present invention;
FIGS. 5A-5E collectively show a flow chart of an exemplary process of conducting data transfer requests of the flash memory of FIG. 2A in accordance with one embodiment of the present invention;
FIGS. 6A-6E collectively show a sequence of data write requests to demonstrate the exemplary process 500 of FIGS. 5A-5E;
FIGS. 7A-7E collectively are a flowchart illustrating an exemplary process of initialization of a large capacity flash memory device in accordance with one embodiment of the present invention;
FIGS. 8(A) and 8(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to an embodiment of the present invention;
FIG. 9 is an exploded perspective view showing the peripheral device of FIG. 8(A) in additional detail;
FIGS. 10-1 and 10-2 are partial perspective views depicting the peripheral device of FIG. 8(A) during operation;
FIGS. 10(A), 10(B) and 10(C) are simplified cross-sectional side views depicting the peripheral device of FIG. 8(A) during operation;
FIGS. 11(A) and 11(B) are exploded perspective and perspective views, respectively, showing a sliding rack assembly of the sliding-rack assembly for a pen-type computer peripheral device similar to that shown in FIG. 8(A) according to an alternative embodiment of the present invention;
FIGS. 12(A) and 12(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to another embodiment of the present invention;
FIG. 13 is an exploded perspective view showing the peripheral device of FIG. 12(A) in additional detail;
FIGS. 14-1 and 14-2 are partial perspective views depicting the peripheral device of FIG. 12(A) during operation;
FIGS. 14(A), 14(B) and 14(C) are simplified cross-sectional side views depicting the peripheral device of FIG. 12(A) during operation;
FIGS. 15(A) and 15(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to another embodiment of the present invention;
FIG. 16 is an exploded perspective view showing the sliding-rack assembly of the pen-type computer peripheral device of FIG. 15(A) in additional detail;
FIG. 17 is an exploded perspective view showing the pen-type computer peripheral device of FIG. 15(A) in additional detail;
FIGS. 18(A) and 18(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to another embodiment of the present invention;
FIG. 19 is an exploded perspective view showing the peripheral device of FIG. 18(A) in additional detail;
FIGS. 20(A) and 20(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to another embodiment of the present invention;
FIG. 21 is an exploded perspective view showing the sliding-rack assembly of the pen-type computer peripheral device of FIG. 20(A) in additional detail;
FIG. 22 is an exploded perspective view showing the pen-type computer peripheral device of FIG. 20(A) in additional detail;
FIGS. 23(A) and 23(B) are perspective views showing a pen-type computer peripheral device in alternative closed and open positions, respectively, according to another embodiment of the present invention; and
FIGS. 24(A), 24(B) and 24(C) are exploded perspective views showing alternative PCBA and USB plug connector arrangements according to alternative embodiments of the invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
The present invention relates to an improvement in flash memory devices such as USB flash drives. The following description is presented to enable one of ordinary skill in the art to make and use the invention as provided in the context of a particular application and its requirements. As used herein, directional terms such as “upper”, “upwards”, “lower”, “downward”, “front”, “rear”, are intended to provide relative positions for purposes of description, and are not intended to designate an absolute frame of reference. In addition, the phrases “integrally connected” and “integrally molded” is used herein to describe the connective relationship between two portions of a single molded or machined structure, and are distinguished from the terms “connected” or “coupled” (without the modifier “integrally”), which indicates two separate structures that are joined by way of, for example, adhesive, fastener, clip, or movable joint. Various modifications to the preferred embodiment will be apparent to those with skill in the art, and the general principles defined herein may be applied to other embodiments. Therefore, the present invention is not intended to be limited to the particular embodiments shown and described, but is to be accorded the widest scope consistent with the principles and novel features herein disclosed.
FIG. 1(A) is a block diagram illustrating an electronic environment in which the present invention may be deployed in an exemplary electronic flash memory device. In particular, FIG. 1(A) is a simplified diagram showing a portable computer peripheral apparatus (e.g., a flash drive device) 100-1 according to a generalized embodiment of the present invention. Apparatus 100-1 is adapted to be accessed by an external computer 90, and is shown to include a printed circuit board assembly (PCBA) 120 including a card body 121, a processing unit 122, a memory device 123, and an input/output interface circuit 125.
Card body 121 is configured for providing electrical and mechanical connection for the processing unit 122, the flash memory module 123, the I/O interface circuit 125, and all of the optional components. Card body 121 may comprise a printed circuit board (PCB) or an equivalent substrate such that all of the components as integrated circuits may be mounted thereon. The substrate may be manufactured using surface mount technology (SMT) or chip on board (COB) technology.
Processing unit 122 and the I/O interface circuit 125 are collectively configured to provide various control functions (e.g., data read, write and erase transactions) of the flash memory module 123. Processing unit 122 may also be a standalone microprocessor or microcontroller, for example, an 8051, 8052, or 80286 Intel® microprocessor, or ARM®, MIPS® or other equivalent digital signal processor. Processing unit 122 and the I/O interface circuit 125 may be made in a single integrated circuit, for application specific integrated circuit (ASIC).
The at least one flash memory module 123 may comprise one or more flash memory chips or integrated circuits. The flash memory chips may be single-level cell (SLC) or multi-level cell (MLC) based. In SLC flash memory, each cell holds one bit of information, while more than one bit (e.g., 2, 4 or more bits) are stored in a MLC flash memory cell. A detail data structure of an exemplary flash memory is described and shown in FIG. 2A and corresponding descriptions thereof. Flash memory module 123 stores, in a known manner therein, one or more data files and an optional reference password. In one embodiment, only authorized users can access the stored data files. The data file can be a picture file, a text file or any other file.
Input/output interface circuit 125 is mounted on the card body 121, and can be activated so as to establish communication with the host computing device 90 by way of a socket 95 via an interface bus 93 that is established when a connector 150 attached to card body 121 is coupled with socket 95. Input/output interface circuit 125 may include circuits and control logic associated with a Universal Serial Bus (USB) interface structure that is connectable to an associated socket connected to or mounted on the host computing device 90.
Processing unit 122 is controlled by a software program module (e.g., a firmware (FW)), which may be stored partially in a ROM (not shown) such that processing unit 122 is operable selectively in: (1) a data programming or write mode, where processing unit 122 activates input/output interface circuit 125 to receive data from the host computing device 90 under the control of the host computing device 90, and store the data in the flash memory module 123; (2) a data retrieving or read mode, where the processing unit 122 activates the input/output interface circuit 125 to transmit data stored in the flash memory module 123 to the host computing device 90; or (3) a data resetting or erasing mode, where data in stale data blocks are erased or reset from the flash memory module 123. In operation, host computing device 90 sends write and read data transfer requests to the first flash memory device 100-1 via the interface bus 93, then input/output interface circuit 125 to the processing unit 122, which in turn utilizes a flash memory controller (not shown or embedded in the processing unit) to read from or write to the associated at least one flash memory module 123. In one embodiment, for further security protection, the processing unit 122 automatically initiates an operation of the data resetting mode upon detecting a predefined time period has elapsed since the last authorized access of the data stored in flash memory module 123.
Referring now to FIG. 2A, which is a diagram depicting an exemplary data structure 200 of a flash memory module 201 (e.g., flash memory module 123 of FIG. 1(A)) in accordance with one embodiment of the present invention. The flash memory module 201 is divided into a plurality of physical blocks e.g., PBK# 0, PBK# 1, PBK# 2, . . . ). In general, there are three categories of physical blocks: 1) the first block 202 (i.e., PBK#0); 2) normal usage data blocks 204 (i.e., PBK# 1, PBK# 2, . . . , PBK#nb); and 3) reserved blocks 206 (i.e., PBK#nb+1, . . . , PBK#nmax−1). The first block (PBK#0) 202 is guaranteed to be a good block and used by the manufacturer to store certain information such as Flash Timing Parameter (FTP), and other information by Initial Manufacturing Program (IMP), which cannot be alter by users. The manufacturer may define a percentage (e.g., 95%) of the total capacity as normal usage data blocks and the rest as reserved. The normal usage data blocks 204 are configured for user to store user data, although the first block (i.e., PBK#1) of the normal usage data blocks 204 is generally used for storing Master Boot Record (MBR), which contains critical data for operation of a computing device. Lastly, the reserved blocks 206 are configured to be accessed by a program module (e.g., FW) via special memory addresses in accordance with one embodiment of the present invention. Examples of the special memory address are 0xFFFF0000, 0xFFFF0001, 0xFFFFFF00, 0xFFFFFF01, etc.
Each block is further divided into a plurality of pages 208 (e.g., P0, P1, . . . , Pnp). Each of the pages 208 includes a data area 210 and a spare area 212. The data area is partitioned into a plurality of sectors (e.g., S0, S1, . . . , Sns). In one embodiment, each sector stores 512-byte of data. The spare area 212 is configured to provide three different fields: 1) a block indicator (BB) 214, a logical address area 216 and an error correction code (ECC) area 218. When a block is tested no good by the manufacturer, the block indicator 214 of that block is set to a special code to indicate a bad block that cannot be used. The logical address area 216 is configured for identifying of that particular physical block for initialization of the flash memory device. More details are described in FIG. 4E and FIG. 4F for the reserved physical blocks as used by an embodiment of the present invention. Detailed processes of initialization are shown in FIGS. 7A-7E. The ECC area 218 is configured to store the ECC for ensuring data integrity.
In order to access the data stored in the normal usage blocks 204 of the flash memory module 201, the host computing device 90 transmits a data transaction request (e.g., data read or write) along with a logical sector address (LSA) to the flash memory device. The processing unit 102 of the flash memory device converts the received LSA into a physical address (i.e., specific block, page and sector numbers) before any data transaction can be performed. Traditionally, the conversion is performed by an address look up table with a one-to-one relationship to the physical address. This solution works for a flash memory device with relatively small capacity, because the address look up table is implemented with a static random access memory (SRAM). It would not be feasible in terms of cost and physical space to include SRAM that grows linearly as the capacity of the flash memory device especially for a large capacity MLC based flash memory device. For example, a large capacity (say 32 Giga-Byte (GB)) MLC based flash memory device using 2112-byte page (i.e., 2048-byte data plus 64-byte spare) and 128 pages per block, it would require more than 2 MB bytes of SRAM to hold the entire address look up table.
FIG. 2B is a diagram showing an exemplary scheme for partitioning a logical sector address in accordance with one embodiment of the present invention. A logical sector address (LSA) 250 is traditionally partitioned as three parts: block 252, page 254 and sector 256. The block portion 252 is also referred to as logical block address (LBA). According to one aspect of the present invention, the LSA 250 is partitioned into four parts: set 262, entry 264, page 254 and sector 256. The page 254 and sector 256 remain the same. And the block 252 is further partitioned into two parts: the set 262 and the entry 264. In other words, instead of just using block 252 as basic unit, the blocks are divided into a plurality of sets 262. Each of the sets 262 includes a plurality of entries 264. For example, if a 24-bit LSA 270 is partitioned in the following manner: 6-bit for set, 8-bit for entry, 8-bit for page and 3-bit for sector, the LSA 270 could represent up to 64 sets of 256 entries (i.e., 16,384 blocks) with each block containing 128 pages and each page containing 8 sectors of 512-byte of data. In this document, the number of the plurality of sets is N, where N is a positive integer.
To carry out the address partition scheme of the present invention, the manufacturer may predefine number of sets and entries in the first physical block (i.e., PBK#0) by the IMP. Instead of mapping all of the logical sector addresses (LSA) to a physical address in a memory, only a portion of the LSA (i.e., a set) is included such that only a limited size of memory is required for address correlation and page usage information. In other words, a limited size memory is configured to hold one set of entries with each entry including an address of the corresponding physical block and a plurality of corresponding page usage flags (see FIG. 4A for details). For example, 18-byte (i.e., 2-byte for the physical block address plus 128-bit or 16-byte for 128 page usage flags) is required for each entry, hence a total of 4608-byte of memory is required for a set with 256 entries.
However, in order to correlate a logical block address to a unique physical block, every entry in each of the plurality of sets must correlate to a unique physical address and a set of page usage flags. Since the limited size memory only has capacity of holding one set of such information, an embodiment of the present invention requires that information of all of the plurality of sets be stored in reserved area 206 of the flash memory 201. Only a relevant set of the plurality of sets is loaded into the limited size memory in response to a particular data transfer request from a host computing system 109. The relevant set is defined as the set with one of the entries matches the entry number derived from the LSA associated with the received data transfer request.
Since there are N sets of address correlation and page usage information stored in the flash memory, each of the N sets is referred to as a partial logical-to-physical address and page usage information (hereinafter ‘PLTPPUI’) appended with a set number (e.g., ‘PLTPPUI0’, ‘PLTPPUI1’, ‘PLTPPUIN’).
In order to simplify the examples and drawings in the Specification, an example with small numbers is used for demonstrate the relationship between LSA, LBA, sector, page, entry and set numbers. Those of ordinary skill in the art will understand implementation of an embodiment of the present invention can be with larger numbers. The following example uses a flash memory with four sectors per page, four pages per block and four entries per set and a logical sector address 159 (i.e., LSA=159) is represented by a binary number “10 01 11 11”. As a result, the least significant four bits of LSA represent sector and page numbers with the two lowest bits for the sector number and the next two for the page number, as each two-bit represents four distinct choices—0, 1, 2 and 3. After truncating the four least significant bits of LSA, the remaining address becomes the corresponding logical block address (LBA). In this example, LBA has a binary value of ‘1001’. Because there are four entries per set in this example, two least significant bits of LBA represent the entry number (i.e., offset number in each set). The remaining high bits of LBA represent the set number. A summary of this example is listed in Table 1.
TABLE 1
10 01 11 11
Set Number Entry Number Page Number Sector Number
According to one aspect of the present invention, an indexing scheme enables the processing unit 102 to translate logical sector addresses (LSAs) and/or logical block addresses (LBAs) provided, in conjunction with a data transfer request, by the host computing device 109 to physical block numbers or addresses (PBK#) in the flash memory device 140. The indexing scheme comprises a plurality of sets of PLTPPUI and physical characteristics of the flash memory such as total number of sets, entries, pages and sectors. And ratios among the set, entry, page and sector. The processing unit 102 can utilize the indexing scheme to determine which sectors of the flash memory are available for each particular data transfer request.
FIG. 3 is a simplified block diagram showing salient components of the process unit 102 of an electronic flash memory device in accordance with one embodiment of the present invention. The processing unit 102 comprises a microcontroller or microprocessor 302, an address correlation and page usage memory (ACPUM) 306, a PLTPPUI tracking table 308, a wear leveling and bad block (WL/BB) tracking table 310, a ACPUM modification flag (ACPUMF) 312, a page buffer 314 and a set of sector update flags 316.
The microcontroller 302 with a flash memory controlling program module 304 (e.g., a firmware (FW)) installed thereon is configured to control the data transfer between the host computing device 109 and the at least one flash memory module 103. The ACPUM 306 is configured to provide an address correlation table, which contains a plurality of entries, each represents a correlation between a partial logical block address (i.e., entries) to the corresponding physical block number. In addition, a set of page usage flags associated with the physical block is also included in each entry. The ACPUM 306 represents only one of the N sets of PLTPPUI, which is stored in the reserved area of the flash memory. In order to keep tracking the physical location (i.e., physical block number) of each of the N sets of PLTPPUI, the physical location is stored in the PLTPPUI tracking table 308. Each item is the PLTPPUI tracking table 308 corresponds a first special logical address to one of the N sets of PLTPPUI. The wear leveling counters and bad block indicator for each physical block is stored in a number of physical blocks referred by corresponding second special logical addresses (e.g., ‘0xFFFFFF00’). The WL/BB tracking table 310 is configured to store physical block numbers that are assigned or allocated for storing these physical block wear leveling counters and bad blocks. The ACPUM modification flag (ACPUMF) 312 is configured to hold an indicator bit that tracks whether the ACPUM 306 has been modified or not. The page buffer 314 is configured to hold data in a data transfer request. The page buffer 314 has a size equaling to the page size of the flash memory 201. The sector update flags 316 are configured to hold valid data flag for each of the corresponding sectors written into data area of the page buffer 314. For example, four sector update flags are be required for a page buffer comprising four sectors. The page buffer 314 also includes a spare area for holding other vital information such as error correction code (ECC) for ensuring data integrity of the flash memory.
FIGS. 4A-4F collectively show exemplary data structures used for managing memory addresses of the flash memory of FIG. 2A in accordance with one embodiment of the present invention. The ACPUM data structure 410 contains Ne rows of entries 414, where Ne is a positive integer. Each row contains a physical block number or address (PBK#) 416 and a plurality of page usage flags 418 associated with the PBK#. The number of pages (Np) is determined by the physical flash memory cell structure and defined by the IMP. ACPUMF 412 contains one bit, which is a toggle switch representing whether the ACPUM 306 has been modified or not. The ACPUMF 412 may be implemented as a register containing either 0 (not modified) or 1 (modified). The page buffer 430 includes a data area containing plurality of sectors (S1, S2, . . . , Sns) and a spare area (not shown in FIG. 4A) containing other information such as ECC. A set of sector update flags 432 is configured to represent respective sectors in the page buffer 430. Each of the sector update flags 432 indicates either a corresponding sector contains a valid data or not. In one implementation, valid data is represented as “1”, while initial or stale state as “0”. These flags may be implemented in a different logic such as reversing the binary representation. As discussed in the prior sections and shown in FIG. 4B, there are N sets of PLTPPUI 411 a-n, where N is a positive integer. The N sets of PLTPPUI 411 a-n represent all of the logical blocks in correlation with physical blocks. Only one of the N sets is loaded into the ACPUM 306 at one time.
Each set of the PLTPPUI is stored in the reserved area 206 of the flash memory 201 of FIG. 2A in a data structure 420 shown in FIG. 4C. The contents of each set of PLTPPUI are stored in one page of a physical block. For example, the PLTPPUI0 is stored at one of a plurality of first special logical addresses “0xFFFF0000”, which corresponds to the first page (P0) 424 a of a physical block ‘PBK#1000422 initially. Due to the MLC flash memory data programming rules, each page can only be programmed or written once (i.e., NOP=1) and data programming within one block can only be in a ascending page order. The second data programming or write can only be into the second page (P1) 424 b until the nth write to the last page (Pn) 424 n of the block ‘PBK#1000422. After that, the next data programming, the (n+1)th write, must be written to the first page (P0) 434 of a new physical block (PBK#1012) 432 just assigned or allocated according to the WL rules. In storing ACPUM 306 into the flash memory, each entry of the ACPUM 306 is written sequentially in the data area 425 of the page. When a first page of a new block is programmed, after the data area has been written, other vital information is written into the spare area 426. The other information include at least the following: a bad block indicator 427, the special logical address 428 issued by the FW for each of the N sets of PLTPPUI and a tracking number 429 for each special logical address. The bad block indicator 427 showing ‘FF’ means a good block. The first special logical address 442 may be ‘0xFFFF0000’. And the tracking number (TN) 446 is set to zero for an initial physical block corresponding to each of the first special logical addresses. The tracking number 446 is incremented by one as a new block is assigned or allocated for storing a particular set of PLTPPUI.
FIG. 4D is a diagram illustrating an exemplary data structure 440 of the PLTPPUI tracking table 308 of FIG. 3. The PLTPPUI tracking table 308 contains a plurality of rows representing a plurality of first special logical addresses 442, one for each of the N sets of PLTPPUI. Each of the N rows contains a physical block number 444, a tracking number (TN) 446 and highest page number 448. The first row of the PLTPPUI tracking table 308 corresponds to the example shown in FIG. 4C.
Similar to the data structure of the PLTPPUI tracking table, an exemplary data structure 450 of a WL/BB tracking table 310 is shown in FIG. 4E. Instead of first special logical addresses for each of the N sets of PLTPPUI, each row is for a second special address 452 of a block of the WL/BB tracking table 310. In one implementation, the second special address 452 may be ‘0xFFFFFFF0’. An exemplary data structure 460 for storing the WL/BB tracking table in the reserved area of a flash memory is shown in FIG. 4F. Similarly, the MLC flash memory data programming rules dictate the data to be written to a new page for each update. The spare area stores the block indicator 467, the second special logical address 452 and tracking number 456.
Referring now to FIGS. 5A-5E, which collectively show a flowchart illustrating an exemplary process 500 of conducting data transfer requests of the flash memory of FIG. 2A in accordance with one embodiment of the present invention. The process 500 is preferably understood in conjunction with previous figures and examples shown in FIGS. 6A-6D. The process 500 is performed by the microcontroller 302 with a flash memory controller program module 304 installed thereon.
The process 500 starts in an ‘IDLE’ state until the microcontroller 302 receives a data transfer request from a host (e.g., the host computing device 90 of FIG. 1(A)) at 502. Also received in the data transfer request is a logical sector address (LSA), which indicates the location the host wishes to either read or write a sector of data (i.e., 512-byte sector). Based on the parameters defined by the IMP and the physical characteristics of the MLC based flash memory, the received LSA is processed to extract the set, entry, page and sector numbers (see Table 1 for an example) included therein. After the received LSA has been processed, the process 500 moves to decision 504. It is determined whether the ACPUM 306 has been loaded with a set of PLTPPUI that covers the received LSA. If ‘yes’, the process 500 reads out the physical block number (PBK#) corresponding to the entry number of the received LSA at 516 before moving to another decision 518, in which it is determined whether the data transfer request is read or write (i.e., program).
If the decision 504 is ‘no’, the process 500 moves to decision 506. The process 500 checks whether the contents of the page buffer 430 need to be stored. In one implementation, the process 500 checks the sector update flags 432 that correspond to sectors in the page buffer 430. If any one of the flags 432 has been set to ‘valid’, then the contents of the page buffer 430 must be stored to the corresponding page of the corresponding physical block of the MLC flash memory at 550 (i.e., the decision 506 is ‘yes’). Detailed process of step 550 is shown and described in FIG. 5D. After the contents of the page buffer 430 have been stored, the process 500 sets the ACPUM modification flag (ACPUMF) 412 to a ‘modified’ status at 508. In other words, the ACPUM 306 has been modified and needs to be stored in the flash memory in the future. Then the process 500 moves to yet another decision 510.
Otherwise if ‘no’ at decision 506, the process 500 moves the decision 510 directly. It is then determined if the ACPUM 306 has been modified. If ‘yes’, the process 500 moves to 580, in which, the process 500 writes the contents of the ACPUM 306 to one of a plurality of first special logical addresses (e.g., ‘0xFFFF0000’ for PLTPPUI0, or ‘0xFFFF0001’ for PLTPPUI1, etc.) for storing corresponding set of PLTPPUI in the reserved area of the flash memory. The ACPUM modification flag 412 is reset at the end of 580. Detailed process of step 580 is shown and described in FIG. 5E. Then, at 514, the process 500 loads a corresponding set of PLTPPUI to the ACPUM 306 from the flash memory based on the set number extracted from the received LSA. Once the ACPUM 306 has been loaded, the process 500 reads the physical block number that corresponds to the entry number at 516 before moving to decision 518. If ‘no’ at decision 510, the process 500 skips step 580 and goes directly to 514.
Next, at decision 518, if the data transfer request is a data read request, the process 500 continues with a sub-process 520 shown in FIG. 5B. The process 500 or sub-process 520 reads data from the corresponding page of the physical block in the flash memory to the page buffer 430. The corresponding page number is derived from the received LSA, and the physical block number is obtained through the ACPUM 306 for the entry numbers at 516. Finally, the process 500 sends the requested data sector from the page buffer 430 to the host 109 before going back the ‘IDLE’ status waiting for another data transfer request.
If the data transfer request is a data write or program request, the process 500 continues with a sub-process 530 shown in FIG. 5C. The process 500 or sub-process 530 moves to decision 532, in which it is determined whether the contents of the page buffer 430 have been modified. If ‘no’, the process 500 writes received data sector into the page buffer 430 according to the sector number derived from the received LSA, and marks the corresponding sector of the sector update flags 432 to indicate valid data in that particular sector has been written in the page buffer 430 at 538. The process 500 then moves back to the ‘IDLE’ state waiting for another data transfer request.
If ‘yes’ at decision 532, the process 500 moves to decision 534. It is determined if the received data sector is in the same entry and page numbers. If ‘yes’, the process 500 writes the received data sector to the page buffer 430 at 538 before going to the ‘IDLE’. If ‘no’ at decision 534, the process 500 writes the page buffer contents to the corresponding page of the physical block of the flash memory at 550. Next, the process 500 sets the ACPUM modification flag 412 to a ‘modified’ status at 536. Next, at 538, the process 500 writes the received data sector to the page buffer before going back to the ‘IDLE’ state.
Finally, in additional to managing data read and write requests, the process 500 regularly performs a background physical block recycling process so that the blocks containing only stale data can be reused later. When the process 500 is in the ‘IDLE’ state, it performs test 540, in which it is determined if the idle time has exceeded a predefine time period. If ‘yes’, the process 500 performs the background recycling process, which may include issuing a dummy data write request to force the page buffer 430 and/or modified ACPUM 306 to be written to corresponding locations of the flash memory at 542. In one embodiment, the dummy data write/program command may be issued to rewrite some of seldom touched physical blocks, for example, physical blocks used for storing user application or system program modules.
Referring to FIG. 5D, a detailed process of step 550 is shown. First, the process 500 is at decision 552, in which it is determined if a new blank physical block is required for storing the contents of the page buffer 430 based on the MLC based flash memory data programming rules. The rules are as follows: 1) each page can only be programmed once (conventionally referred to as ‘NOP=1’); and 2) data programming is performed to a page of a same block in the ascending or sequential order, or each new page must have a high page number in the same block. If ‘no’ at decision 552, the process 500 writes valid data sectors based on the sector update flags 432 from the page buffer 430 to the page register of the corresponding page of the corresponding physical block of the flash memory at 554. Next, at 556, the process 500 updates the corresponding one of the page usage flags in the ACPUM 306 for the page just written to the flash memory. The process 500 then resets the sector update flags at 558 before returning.
If ‘yes’ at decision 552, the process 500 searches for a blank physical block based on the wear leveling (WL) rule; once found, the process 500 designates it as a new block at 562. Then, the process 500 updates the ACPUM 306 with the new physical block number for the entry number and keeps the page usage flags the same. It is noted that the entry number is derived from the received LSA. Next, at 566, the process 500 copies all valid pages with page number less than the current page number from the old to the new physical block if needed. The current page number if the page number derived from the received LSA. Then, the process 500 writes the valid data sectors based on the sector update flags 432 from the page buffer 430 to the page register of the corresponding page of the new physical block at 568. Finally if necessary, the process 500 copies all valid pages with page number greater than the current page number from the old to the new physical block at 570. The process 500 resets the sector update flags at 558 before returning.
FIG. 5E is a flowchart illustrating step 580 of the process 500. First, in step 580, the process 500 locates the corresponding physical block in the reserved area of the flash memory using a particular one of the first special logical addresses from the PLTPPUI tracking table 308. The corresponding physical block is configured to store the contents of the current ACPUM 306, which is associated with the first special logical address, for example, ‘0xFFFF0000’ for ‘PLTPPUI0’, ‘0xFFFF0001’ for ‘PLTPPUI1’, etc. Next, at decision 584, it is determined whether the physical block is full or not. If ‘no’, the process 500 writes the contents of the ACPUM 306 to the next page in the physical block at 586. It is noted that the MLC based flash memory data programming rule dictates that only a new higher page in the same block is allowed to be programmed or written. Then the process 500 updates the PLTPPUI tracking table 308 to reflect that a new page has been written into the physical block by incrementing the highest page count 448 at 588. Finally, before returning at 590, the process 500 resets the ACPUM modification flag 412 to a ‘not modified’ status as the contents of the ACPUM 306 have been stored to the flash memory.
Referring back to decision 584, if ‘yes’, the process 500 searches a blank physical block as a new physical block (e.g., new physical block (PBK#1012) in FIG. 4C) in the reserved area of the flash memory based on the WL rule, and the old physical block (e.g. old physical block (PBK#1000) in FIG. 4C) is sent to a recycling queue for reuse at 592. Next, at 594, the process 500 writes the contents of the ACPUM 306 to the first page (e.g., ‘P0’ of FIG. 4C) of the new block. After the contents of the ACPUM have been stored in to the data area of the first page, the tracking number (TN) is incremented by one. Next, at 596, the first special logical address for this particular set of PTLPPUI and the new tracking number (TN) are written into the spare area of the first page. The process 500 then updates the PLTPPUI tracking table 308 with the new physical block number, the tracking number and the highest page number for the current set of PLTPPUI at 598. Before returning, the process 500 resets the ACPUM modification flag 412 to a ‘not modified’ status at 590.
FIGS. 6A-6D collectively show a sequence of data write or program requests to demonstrate the exemplary process 500 of FIGS. 5A-5E. In order to simplify the drawings and description, the sequence of the data write requests is perform on an exemplary flash memory with four sectors per page, four pages per block, and four entries per set. As a result of the simplified assumption, the logical sector address (LSA) 602 received along with the data write request can be processed in a scheme corresponding to Table 1. In other words, two least significant bits of the LSA represent the sector number, next two the page number, next two the entry number, and the remaining bits the set number.
The sequence of the data write requests starts with (a) writing to LSA=0, which corresponds to set 0 (i.e., PLTPPUI0), entry 0, page 0 and sector 0. PLTPPUI0 is loaded into ACUPUM 604, in which the first entry (i.e., entry 0) corresponds to physical block ‘PBK#2’ and page usage flags 606 are not set. The ACPUMF 614 is set to a ‘un-modified’ status. The sector data (S0) is written to the first sector of the page buffer 610 and the corresponding flag in the sector update flags 612 is set to a ‘V’ for valid data. The corresponding path in the process 500 for writing LSA=0 is as follows:
    • (1) receiving an LSA=0 and extracting set, entry, page and set numbers at 502;
    • (2) determining whether ACPUM contains a current set of PLTPPUI at 504 (yes, PLTPPUI0);
    • (3) reading physical block number (PBK#2) at entry 0 at 516;
    • (4) determining data transfer request type at 518 (write);
    • (5) determining whether page buffer contents have been modified at 532 (no);
    • (6) writing received data sector (S0) into the page buffer and marking corresponding sector (1st) update flag at 538; and
    • (7) going back to ‘IDLE’ for next data transfer request.
The next data write request (b) is to write to LSA=1. The corresponding path is the process 500 is as follows:
    • (1) receiving an LSA=1 and extracting set, entry, page and set numbers at 502;
    • (2) determining whether ACPUM contains a current set of PLTPPUI at 504 (yes, PLTPPUI0);
    • (3) reading physical block number (PBK#2) at entry 0 at 516;
    • (4) determining data transfer request type at 518
(write);
    • (5) determining whether page buffer contents have been modified at 532 (yes);
    • (6) determining whether page and block number current at 534 (yes);
    • (7) writing received data sector (S1) into page buffer and marking corresponding sector (2nd) update flag at 538; and
    • (8) going back to ‘IDLE’ for next data transfer request.
The next data write request (c) is to write to LSA=3 (FIG. 6B). The corresponding path is the process 500 is as follows:
    • (1) receiving an LSA=3 and extracting set, entry, page and set numbers at 502;
    • (2) determining whether ACPUM contains a current set of PLTPPUI at 504 (yes, PLTPPUI0);
    • (3) reading physical block number (PBK#2) at entry 0 at 516;
    • (4) determining data transfer request type at 518 (write);
    • (5) determining whether page buffer contents have been modified at 532 (yes);
    • (6) determining whether page and block number current at 534 (yes);
    • (7) writing received data sector (S3) into the page buffer and marking corresponding sector (4th) update flag at 538; and
    • (8) going back to ‘IDLE’ for next data transfer request.
The next data write request (d) is to write to LSA=9 (FIG. 6B). The corresponding path is the process 500 is as follows:
    • (1) receiving an LSA=9 and extracting set, entry, page and set numbers at 502;
    • (2) determining whether ACPUM contains a current set of PLTPPUI at 504 (yes, PLTPPUI0);
    • (3) reading physical block number (PBK#2) at entry 0 at 516;
    • (4) determining data transfer request type at 518
(write);
    • (5) determining whether page buffer contents have been modified at 532 (yes);
    • (6) determining whether page and block number current at 534 (no, same block but different page);
    • (7) writing the page buffer contents to the corresponding page (first page of PBK#2) at 550, which includes determining a new block is required at 552 (no); writing sector data to the first page of PBK# 2 at 554; updating at the corresponding page usage flag (P0) in ACPUM at 556 and resetting sector update flags at 558;
    • (8) setting the ACPUMF (i.e., 1 for ‘modified’) at 536; and
    • (9) writing received data sector (S1) into the page buffer and marking corresponding sector (2nd) update flag at 538 before going back to “IDLE”.
The next data write request (e) is to write to LSA=54 (FIG. 6C). The corresponding path is the process 500 is as follows:
    • (1) receiving an LSA=54 and extracting set, entry, page and set numbers at 502;
    • (2) determining whether ACPUM contains a current set of PLTPPUI at 504 (yes, PLTPPUI0);
    • (3) reading physical block number (PBK#3) at entry 3 (i.e., binary ‘11’) at 516;
    • (4) determining data transfer request type at 518 (write);
    • (5) determining whether page buffer contents have been modified at 532 (yes);
    • (6) determining whether page and block number current at 534 (no, different block);
    • (7) writing the page buffer contents to the corresponding page (third page of PBK#2) at 550, which includes determining a new block is required at 552; writing sector data to the third page of PBK# 2 at 554 (no); updating at the corresponding page usage flag (P2) in ACPUM at 556 and resetting sector update flags at 558;
    • (8) setting the ACPUMF (i.e., 1 for ‘modified’) at 536; and
    • (9) writing received data sector (S2) into the page buffer and marking corresponding sector (3rd) update flag at 538 before going back to “IDLE”.
Finally, the next data write request (f) is to write to LSA=171 (FIG. 6D). The corresponding path is the process 500 is as follows:
    • (1) receiving an LSA=171 and extracting set, entry, page and set numbers at 502;
    • (2) determining whether ACPUM contains a current set of PLTPPUI at 504 (no, PLTPPUI0 does not match PLTPPUI2);
    • (3) determining whether the page buffer contents need to be stored at 506 (yes);
    • (4) writing the page buffer contents to the corresponding page (second page of PBK#3) at 550, which includes determining a new block is required at 552; writing sector data to the second page of PBK# 3 at 554; updating at the corresponding page usage flag (P1) in ACPUM at 556 and resetting sector update flags at 558 and setting the ACPUMF (i.e., 1 for ‘modified’) at 508; (shown in upper half of FIG. 6D)
    • (5) determining whether ACPUM has bee modified at 510 (yes);
    • (6) writing the ACPUM contents to corresponding physical block corresponding to the first special logical address for particular one of the N sets of PLTPPUI (PLTPPUI0), which includes locating the physical block from the PLTPPUI tracking table at 582; determining if the physical block is full at 584 (no); writing the ACPUM contents to a next page in the physical block at 586; updating the PTLPPUI tracking table with the next page number as the highest page number at 588; and resetting the ACPUMF at 590 (i.e., 0 for ‘un-modified’);
    • (7) loading a corresponding set of PLTPPUI (PLTPPUI2) from MLC to ACPUM at 514;
    • (8) reading physical block number (PBK#21) at entry 2 (i.e., binary ‘10’) at 516;
    • (9) determining data transfer request type at 518 (write);
    • (10) determining whether page buffer contents have been modified at 532 (no);
    • (11) writing received data sector into the page buffer ad marks the corresponding one of the sector update flags at 538 before going back to the ‘IDLE’ state;
    • (12) determining whether the ‘IDLE’ time has exceeded a predefined period at 540 (yes); and
    • (13) performing background recycling of old blocks with stale data and writing the modified page buffer and ACPUM to MLC at 542 (more details in FIG. 6E).
FIG. 6E is a diagram showing a complicated data program or write involving a physical block containing data that prevents another data program operation directly in accordance with the MLC data programming rules. Using the sequence of data write requests shown in FIGS. 6A-6D, after the final data write request (f) has been completed. Both the page buffer 610 and ACPUM 604 have been modified, but yet to be stored in the flash memory. Due to data already existed in certain pages of the physical block (i.e. PBK#21), the MLC data program rules 684 prevent the modified page buffer 610 be written to PBK# 21. A new blank block (i.e., PBK#93) is allocated and assigned to hold the data in the old block (PBK#21) including updates from the modified page buffer 610. The corresponding path in the step 550 of the process 500 is as follows:
    • (1) determining a new physical block is required according to the MLC rules at 552 (yes);
    • (2) allocating and assigning a new block based on the wear leveling rule at 554;
    • (3) updating the ACPUM 604 with the new block number (PBK#93) and same page usage flags at 564;
    • (4) if required, copying the valid pages with page number smaller than the current page number (i.e., P2 or 3rd page derived from LSA) from the old block (PBK#21) to the new block PBK#93) at 566 (see STEP 1 in circle in FIG. 6E);
    • (5) writing sector data (S3) from the page buffer to the register of the corresponding page of PBK# 93 and thus updating the page in PBK# 93 at 568 (see STEP 2 in circle in FIG. 6E);
    • (6) if required, copying the valid pages with page number greater than the current page number (i.e., P2 or 3rd page derived from LSA) from the old block (PBK#21) to the new block PBK#93) at 570 (see STEP 3 in circle in FIG. 6E); and
    • (7) resetting the sector update flags at 558 before following the remaining data write steps of the process 500.
Referring now to FIGS. 7A-7E, which collectively are a flowchart illustrating an exemplary process 700 of initialization of a large capacity flash memory device in accordance with one embodiment of the present invention. The process 700 starts with a power up, for example, a flash memory device is plugged into a host 109. Next, the process 700 recreates the PLTPPUI tracking table 308 of FIG. 3 from stored N sets of PLTPPUI in the reserved area of the flash memory at 710. Then the process 700 validates the stored wear leveling and error correction code information with actual state of all of the physical blocks at steps 730 and 750, respectively. At 770, the process 700 verifies and validates the store PLTPPUI records against actual state of the physical blocks associated with a plurality of first special logical addresses. Finally, the process loads one of the N sets of PLTPPUI into ACPUM 306 at 790 before the initialization ends. The details of steps 710, 730, 750 and 770 are shown and described in respective FIGS. 7B, 7C, 7D and 7E.
Shown in FIG. 7B, the process 700 initializes contents of the PLTPPUI tracking table 308 to zero and a physical block counter (PBK#) to 0 at 712. Next, the process 700 reads stored logical address and tracking number (TN) in the spare area of the first page of the physical block ‘PBK#’ at 714. Then the process 700 moves to decision 716, in which it is determined whether the stored logical address is one of the first special addresses for storing PLTPPUI issued by the FW and microcontroller. If ‘no’, the process 700 simply skips this physical block by incrementing the physical block counter ‘PBK#’ by one at 724. Next if additional physical block determined at decision 726, the process 700 moves back to step 714 for processing the next physical block, otherwise the step 710 is done.
If ‘yes’ at the decision 716, the process 700 follows the ‘yes’ branch to another decision 718. It is then determined whether the stored tracking number is newer than the one listed in the PLTPPUI tracking table 308. For example, the contents in the PLTPPUI tracking table is initialized to zero, any stored tracking number (TN) greater than zero indicates that the stored records are newer. If ‘no’ at decision 718, the process 700 skips this physical block similar to the ‘no’ branch of decision 716. However, if ‘yes’ at decision 718, the process 700 searches and locates a highest written page in this physical block ‘PBK#’ at 720. Next, at 722, the process 700 writes the ‘PBK#’, TN and highest page number in the PLTPPUI tracking table corresponding to the first special logical address. Finally, the process 700 increments the physical block count ‘PBK#’ by one at 724, then moves to decision 726 to determine either moving back to 714 for processing another physical block or ending the step 710.
Details of step 730 are shown in FIG. 7C. At 732, the process 700 initializes a physical block counter ‘PBK#’ and a group counter ‘m’ to zero. Next, the process 700 loads a ‘mth’ group of stored WL/BB tracking table into a scratch memory space (e.g., the page buffer 314 of FIG. 3) at 734. Then the process 700 reads the wear leveling (WL) counter and bad block indicator for the physical block ‘PBK#’ at 736. The process 700 moves to decision 738, in which it is determined whether the stored information is in conflict with the physical state of ‘PBK#’. If ‘yes’, the process 700 corrects the conflict information to be consistent with the physical state in the scratch memory at 740. If ‘no’ at decision 738, there is no need to correct the conflict.
Next, at 742, the physical block counter ‘PBK#’ is incremented by one. The process 700 moves to another decision 744, it is determined if there is additional block in the ‘mth’ group. If ‘yes’, the process 700 goes back to step 736 reading another WL counters of another physical block to repeat the above steps until the decision 744 becomes ‘no’. The process 700 updates the stored WL/BB tracking table 310 at 746. At next decision 748, it is determined if there is any more physical block. If ‘yes’, the process 700 increments the group counter at 749 then goes back to 734 for repeating the above steps for another group. Otherwise, the step 730 returns when the decision 748 is ‘no’.
FIG. 7D shows details of step 750, which is substantially similar to the step 730. Instead of checking and correcting conflict WL/BB information, the step 750 validates and corrects the stored error correction code (ECC) for all physical blocks. The number of group is related to the size of the scratch memory. For example, a 2048-byte page buffer can provide space for holding a group of 1024 WL counters, if each of the WL counters is a 16-bit number. As to the 8-bit ECC, the same 2048-byte page buffer may hold a group of 2048 ECC codes.
FIG. 7E shows details of step 770. At 772, the process 700 initializes a logical block counter ‘LBK#’ and a group counter ‘k’ to zero. The process 700 loads a ‘kth’ group of stored PLTPPUI into a scratch memory space (e.g., a page buffer or other available memory) at 774. The process 700 reads logical block address from the spare area of the first page of a physical block corresponding to the ‘LBK#’ at 776. Next, at decision 778, it is determined whether there is conflict between the stored PLTPPUI and the physical page usage of the physical block. If ‘yes’, the conflict is corrected with the physical state in the scratch memory at 780. Otherwise, the process 700 skips step 780. Next, at 782, the process 700 increments the logical block counter ‘LBK#’ by one. The process 700 then moves to another decision 784, in which it is determined if there is more block in the ‘kth’ group. If ‘yes’, the process 700 moves back the step 776 repeating the process until the decision 784 becomes ‘no’. Then the process 700 updates the stored PLTPPUI records if the scratch memory has been altered at 786. Next, at decision 788, if there is more logical block, the process 700 follows the ‘yes’ branch to step 789 by incrementing the group counter and repeating the process from step 774 until the decision 788 becomes ‘no’, in which the step 770 ends.
Each entry record of PLTPPUI is 18-byte, which is a sum of 2-byte physical block number plus 128-bit (i.e., 16-byte) of page usage flags (i.e., 128 pages per block). Using 2048-byte page buffer as a scratch memory can only hold a group of 113 entry records. One may use a larger memory such as ACPUM 306 as the scratch memory, which may hold more entry records thereby reducing the initialization time.
Referring again to FIG. 1(A), in one embodiment the present invention is directed to a pocket-sized, press-push, pen-type (i.e., retractable) portable computer peripheral device 100-1 that allows positioning plug connector 150 into either a deployed position (indicated in FIG. 1(A) by solid lines) or a retracted position (indicated in FIG. 1(A) by dashed lines). In particular, peripheral device 100-1 includes an elongated housing 110 having a front portion 111 defining a front end (second) opening 112, and defines an internal region surrounded by walls that is sized to allow slidable movement of PCBA 120 between the deployed and retracted position, as shown in FIG. 1(A). Plug connector 150 is fixedly connected to PCBA 120, which includes several electronic devices (e.g., I/O interface circuit 125, processing unit 122 and MLC based flash memory chip 123, all described in detail above), and is disposed to protrude through front opening 112 when moved into the deployed position (e.g., such that plug connector 150 can be plugged into female socket 95 of host computing device 90, as shown in FIG. 1(A) in solid lines).
According to an aspect of the invention, device 100-1 includes a locking mechanism for maintaining plug connector in each of the retracted and deployed position. For example, as indicated by the simplified embodiment of FIG. 1(A), housing 110 defines at least one additional actuator (first) opening 115, and an actuator button 163 is disposed on PCBA 120 such that it extends through actuator opening 115. Actuator opening 115 is defined, for example, in a side wall (as shown in FIG. 1(A)) or a rear end wall of housing 110. Actuator button 163 includes one or more engaging members (e.g., pawls 164-1 and 164-2), and housing 110 includes one or more corresponding engaging members (e.g., grooves 116-1 and 116-2). When plug connector is moved into the deployed position (indicated by solid lines in FIG. 1(A)), pawl 164-1 engages groove 116-1, thereby preventing movement of PCBA 120 inside housing 110 until a release operation (e.g., pushing or pulling on button 163) is manually performed by a user. Conversely, when plug connector is moved into the retracted position (indicated by dashed lines in FIG. 1(A)), pawl 164-2 engages groove 116-2, thereby securing PCBA 120 inside housing 110.
According to another aspect of the present invention, button 163 and the locking mechanism formed by pawls 164-1/2 and grooves 116-1/2 form part of a positioning mechanism 160 that also includes at least one resilient member (e.g., springs 170-11 and 170-12, shown in FIG. 1(A), or springs 170-21 and 170-22 shown in FIG. 1(B), which discloses a device 100-2 that is otherwise identical to device 100-1) that are provided for biasing plug connector 150 between the deployed position and the retracted position. In the example shown in FIG. 1(A), springs 170-11 and 170-12 are coupled at one end to plug connector 150 (e.g., by way of PCBA 120) and at the other end to housing 110. That is, at least one resilient member is connected between plug connector 150 and either to front portion 111 of housing 110 (e.g., as indicated by springs 170-11 and 170-12 in FIG. 1(A)) or rear portion 113 (e.g., as indicated by springs 170-21 and 170-22 in FIG. 1(B)) of housing 110, depending on whether the resilient member intended to deploy or retract the plug connector 150. For example, springs 170-11 and 170-12 are disposed to perform a spring-loaded retraction function, whereby when plug connector 150 is deployed from housing 110 by pressing and sliding actuating button 163 to stretch springs 170-11 and 170-12 until pawl 164-1 engages locking groove 116-1 and plug connector protrudes through front end opening 115, springs 170-11 and 170-12 are stretched (indicated by dashed line) such that they store mechanical energy. When this spring-loaded mechanism is subsequently released (i.e., button 163 is subsequently manipulated to disengage pawl 164 from groove 116-1), the energy stored in springs 170-11 and 170-12 causes springs 170-11 and 170-12 to return to its unstretched shape (indicated by solid line in FIG. 1(A)), thereby biasing plug connector 150 from the deployed position to the retracted position. Conversely, as shown in FIG. 1(B), springs 170-21 and 170-22 are disposed to perform a spring-loaded deployment function, whereby when plug connector 150 is deployed from housing 110 and pawl 164 is engaged into locking groove 116-2 (indicated by dashed lines in FIG. 1(B)), springs 170-21 and 170-22 are stretched (indicated by dashed lines in FIG. 1(B)) such that they store mechanical energy. When this spring-loaded mechanism is subsequently released (i.e., button 163 is subsequently manipulated to disengage pawl 164 from groove 116-2), springs 170-21 and 170-22 bias plug connector 150 from the deployed position (energy stored) into the retracted position, and springs 170-21 and 170-22 return to their original shape (indicated by solid lines in FIG. 1(B)). By utilizing springs 170-11/12 (FIG. 1(A)) or 170-21/22 (FIG. 1(B)) to retract or deploy plug connector 150 in this manner, the present invention provides a computer peripheral device having a desirable spring-loaded deploying/retracting feature that protects plug connector 150 without the need for a separate cap.
Various MLC retractable flash memory device embodiments incorporating the mechanism described with reference to FIGS. 1(A) and 1(B) will now be described. Each of these devices includes a sliding rack which is enclosed inside a housing structure in which a USB plug connector could be extended out or retracted in by sliding a slide button either on the top or on the side of the housing structure, or by pressing the rear push button of the housing in accordance with the specific embodiments set forth below.
FIGS. 8(A) and 8(B) are perspective top views showing a pocket-sized, pen-type (i.e., retractable) portable computer peripheral device 100A having a retractable Universal Serial Bus (USB) plug connector 150A according to a first specific embodiment of the present invention. In this embodiment the flash memory device is a slide MLC USB flash drive including the MLC based flash memory chip described in detail above. As shown in FIG. 8(A), in a fully retracted position, USB plug connector 150A is retracted through a front opening 112A defined by elongated housing 110A such that connector 150A is safely disposed inside housing 110A. A press-push button 163A is integrally connected to a positioning member (not shown, described below) and is partially exposed through a slot 115A to facilitate manual movement from the fully retracted (first) position shown in FIG. 8(A), to the fully deployed (second) position shown in FIG. 8(B). In particular, plug connector 150A is deployed from housing 110A by pressing press-push button 163A in the direction of arrow P, which releases mechanical energy stored in a pair of linear springs (described below), causing button 163A to slide forward along slot 115A (i.e., in the direction of arrow S in FIG. 8(A)). When plug connector 150A is deployed/exposed outside housing 110A, peripheral device 100A can be plugged into a host computer and function in the programming, data retrieving, and data resetting modes described above. Once the desired operations are completed, plug connector 150A is retracted into housing 110A by pressing press-push button 163A and manually pulling backward, which causes button 163A to retract backward along slot 115A (i.e., in the direction opposite to arrow S in FIG. 8(A)) to load the linear springs for a future spring-loaded deployment.
FIG. 9 is an exploded perspective view showing device 100A in additional detail. Device 100A generally includes a rectangular two-part housing 110A, a printed circuit board assembly (PCBA) 120A that is mounted inside of housing 110A, a manual (slide) positioning member 160A mounted on PCBA 120A, and a pair of metal flat springs 170A-1 and 170A-2.
As indicated in FIG. 8(A) and shown in FIG. 9, two-part molded plastic housing 110A includes a lower (first) portion 110A-1 and an upper (second) portion 110A-2.
As shown at the bottom of FIG. 9, lower portion 110A-1 includes a lower wall 114A-1, first side wall portions 117A-11 and 117A-12, a rear wall portion 113A-1, and front wall portions 111A-11 and 111A-12 defining a front opening portion 112A-1. Connecting tabs 118-A1 protrude from inside surfaces of side walls 117A-11 and 117A-12. Slide tracks (e.g., slide track 119A-1) are defined in lower wall 114A-1.
As shown at the top of FIG. 9, upper portion 110A-1 includes a relatively wide, elongated upper wall that is divided into a front upper wall portion 114A-21 and a rear upper wall portion 114A-22 that are separated by a slot 115A. Extending downward from the upper wall are side walls including outer side wall portions 117A-21 and 117A-22, front wall portions 111A-21 and 111A-22 that define front opening portion 112A-2, and a rear outer wall 113A-2. Connecting slots 118A-2 are defined on inner side walls 117A-21 and 117A-22. Retracted lock grooves 116A-1 and deployed lock grooves 116A-2 are defined in an inside surface of front upper wall portion 114A-21/22.
According to an aspect of the present embodiment, a sliding rack assembly includes PCBA 120A, a USB plug connector 150A, a slide rack (positioning member) 160A, and two linear springs 170A-1 and 170A-2.
Referring to the center of FIG. 9, PCBA 120A includes a printed circuit board (PCB or card) 121A and USB plug (metal) connector 150A that is attached to a front end of PCB 121A using known techniques such that PCB 121A is approximately aligned centered to USB metal connector 150A. As discussed above, PCB 121A includes several ICs (e.g., a controller or processing unit 122A and flash memory 123A) disposed thereon. The ICs are electronically connected together and to connector 150A using known techniques.
Referring to the center of FIG. 9, positioning member 160A includes a base portion 161A and a flexible wall 162A that is connected to base portion 161A such that flexible wall 162A is resiliently bendable relative to base portion 161A in the manner described below. Press-push button 163A extends upward from flat flexible wall 162A. Locking tabs (first locking structures) 164A also extend upward from flat flexible surface 162A next to button 163A. First and second slide rails 167A-1 and 167A-2 are fixedly connected to and extend substantially perpendicular to base portion 161A. Elongated grooves 168A-1 and 168A-2 are respectively formed on slide rails 167A-1 and 167A-2, and are sized to receive linear springs 170A-1 and 170A-2.
As indicated in FIG. 9, during assembly PCBA 120A (with connector 150A already attached) is mounted onto positioning member 160A with plug connector 150A extending from the front thereof, and then PCBA 120A is pressed against positioning member 160A until locking tabs not shown snap into cut-outs provided on PCB 121A. Linear springs 170A-1 and 170A-2 are then slid into corresponding grooves 168A-1 and 168A-2 such that one end of each linear spring is engaged into a locking hole (not shown) defined in positioning member 160A. The assembly is then mounted into lower housing 110A-1 such that slide rails 167A-1 and 167A-2 are slidably engaged in corresponding slide tracks 119A-1, and then upper mounting 110A-2 is mounted over the assembly such that a second end of each linear spring 170A-1 and 170A-2 is engaged into a locking hole (not shown) defined in upper housing 110A-2, and such that a portion of press-push button 163A (which extends from flat flexible wall 162A) is received in slot 115A. Finally, the side walls (e.g., side wall 117A-21) of upper housing portion 110A-2 are aligned to be received by corresponding side walls (e.g., side walls 117A-11 and 117A-12) of lower housing portion 110A-1, and then pressed until locking tabs 118A-1 are snapped into slots 118A-2. In an alternative embodiment, ultrasonic welding may be used in place of the snap-coupling mechanism described above to secure housing portions 110A-1 and 110A-2.
FIGS. 10-1 and 10-2 are partial perspective views depicting peripheral device 100A in the deployed and retracted positions with side walls of housing 110A removed for illustrative purposes, and FIGS. 10(A) to 10(C) are simplified cross-sectional side views showing peripheral device 100A during a deployment operation. In the retracted state shown in FIGS. 10-1 and 10(A), plug connector 150A is disposed inside housing 110A, protrusions (lock tabs) 164A-1 are engaged in rear lock slots 116A-1, and springs 170A-1 and 170A-2 are subjected to stretch/extension. As indicated in FIG. 10(B), pressing down button 163A releases protrusions 164A-1 from rear slot locks 116A-1, causing the sliding rack assembly to be propelled forward (i.e., in the direction of arrow S) by linear springs 170A-1 and 170-2. As indicated in FIGS. 10-2 and 10(C), the plug connector 150A is thus pushed into its deployed position by way of the spring-loaded mechanism such that it extends through front end opening 112A, and is held in the deployed position by front protrusions 164A-2 engaging in front lock slots 116A-2. Note that button 163A is free to move forward due to the clearance provided by slot 115A. Subsequent return to the retracted position requires pressing button 163A downward and manually sliding the assembly back into the retracted position.
Note that connector 150A is sprung forward or backward depending on the coupling orientation of springs 170A-1 and 170A-2 to positioning member 160A and housing 100A. In another alternative embodiment described below, the sliding rack assembly is sprung back to retract the USB plug connector in the housing when pressing the actuating button downward when the plug connector is in the deployed position. Further, the press/push switch (or slide button) mechanism is located on the side of the flash memory device, the top, or the rear; and relies upon the resilient properties of the sliding rack and springs to create a smooth, locking mechanism for the extension or retraction of the USB plug. The slide button must first be depressed inwards, towards the body of flash memory drive, in order for the sliding rack to move between its two locked positions along slide tracks. The extended (front) lock slot/groove and the retracted (rear) lock slot/groove serve to lock the button (top, side, or rear) in either the extended position or retracted position, respectively.
FIGS. 11(A) and 11(B) are partial exploded perspective and perspective views, respectively, showing a sliding rack assembly according to an alternative embodiment in which springs 170A-11 and 170A-12 are connected by way of a cross-bar 175A, and the resulting spring assembly is mounted onto sliding rack 160A-1 in a single piece. Note that sliding rack 160A-1 is essentially identical to sliding rack 160A (described above), but includes rear slots 169A-1 for receiving cross-bar 175A, as indicated by the assembly in FIG. 11(B). This arrangement simplifies the assembly process relative to the two spring embodiment (described above), thereby reducing manufacturing costs.
FIGS. 12(A) and 12(B) are perspective top views showing a retractable portable computer peripheral device 100B having a retractable USB plug connector 150B according to another specific embodiment of the present invention. Similar to the first embodiment (described above), in a fully retracted position, USB plug connector 150B is retracted through a front opening 112B defined by elongated housing 110B, a press-push button 163B is integrally connected to a positioning member (not shown, described below) and is partially exposed through a slot 115B to facilitate manual movement from the fully retracted (first) position shown in FIG. 12(A), to the fully deployed (second) position shown in FIG. 12(B). However, unlike the first embodiment, USB plug connector 150B is biased by pair of linear springs that are disposed in housing 110B such that the resilient member biases plug connector 150B from the deployed position shown in FIG. 12(B) to the retracted position shown in FIG. 12(A). That is, to deploy USB plug connector 150B for use, a user manually presses press-push button 163B into housing 110B (i.e., in the direction P indicated by dark arrow in FIG. 12(A)), and then pushes (slides) button 163B along slot 115B toward the front end of housing 110B (i.e., in the direction of arrow S in FIG. 12(A)). This press-push operation causes plug connector 150B to emerge from front end opening 112B such that peripheral device 100B can be plugged into a host computer and function in the programming, data retrieving, and data resetting modes described above. Once the desired operations are completed, plug connector 150B is retracted into housing 110B by pressing press-push button 163B, which releases mechanical energy stored in a pair of linear springs (described below) and causes button 163B to slide backward along slot 115B (i.e., in the direction opposite to arrow S in FIG. 12(A)).
FIG. 13 is an exploded perspective view showing device 100B in additional detail. Device 100B generally includes a rectangular two-part housing 110B including a lower portion 110B-1 and an upper portion 110B-2, and a sliding rack assembly includes a PCBA 120B and USB plug connector 150B mounted thereon, a slide rack 160B, and two linear springs 170B-1 and 170B-2 that is mounted inside of housing 110B. Housing 110B is similar to that described in the first embodiment, and differs only in that upper wall portion 114B-2 defines retracted lock grooves 116B-1 and deployed lock grooves 116B-2 at opposing ends of slot 115B. Referring to the center of FIG. 13, positioning member 160B includes a base portion 161B and a flexible wall 162B disposed in a manner similar to that described above. Press-push button 163B is somewhat more oblong than in the first embodiment, and includes locking tabs 164B disposed on each side thereof. Similar to the earlier embodiment, elongated grooves 168B-1 and 168B-2 are respectively formed on slide rails 167B-1 and 167B-2, and are sized to receive linear springs 170B-1 and 170B-2, and assembly of device 100B is substantially the same as that described above for the first embodiment.
However, instead of connecting the springs to the rear end slide rails 167B-1 and 167B-2 and to the front of housing 110B, the connections are reversed in the present embodiment to facilitate the spring-loaded retraction operation illustrated in FIGS. 14(A) to 14(C).
FIGS. 14-1 and 14-2 are partial perspective views depicting peripheral device 100B in the deployed and retracted positions with side walls of housing 110B removed for illustrative purposes, and FIGS. 14(A) to 14(C) are simplified cross-sectional side views showing peripheral device 100B during a spring-loaded retraction operation. In the deployed state shown in FIGS. 14-1 and 14(A), plug connector 150B is disposed outside housing 110B, lock tabs 164B are engaged in front lock slots 116B-2, and springs 170B-1 and 170B-2 are subjected to stretch/extension. As indicated in FIG. 14(B), pressing down button 163B releases protrusions 164B from front slot locks 116B-2, causing the sliding rack assembly to be propelled backward (i.e., in the opposite direction of arrow S) by linear springs 170B-1 and 170-2. As indicated in FIGS. 14-2 and 14(C), the plug connector 150B is thus pulled into its retracted position by way of the spring-loaded mechanism such that it is disposed inside housing 110B, and is held in the retracted position by locking protrusions 164B engaged in rear lock slots 116B-1. Subsequent return to the deployed position requires pressing button 163B downward and manually sliding the assembly forward into the deployed position.
FIGS. 15(A) and 15(B) are perspective top views showing a portable computer peripheral device 100C having a retractable USB plug connector 150C and a side-mounted spring-pressed button 163C according to another specific embodiment of the present invention. Similar to the first embodiment (described above), in a fully retracted position, USB plug connector 150C is retracted through a front opening 112C defined by elongated housing 110C, and press-push button 163C is integrally connected to a positioning member (not shown, described below) and is partially exposed through a slot 115C to facilitate manual movement from the fully retracted (first) position shown in FIG. 15(A), to the fully deployed (second) position shown in FIG. 15(B). In addition, similar to the first specific embodiment described above, a pair of linear springs disposed in housing 110C bias plug connector 150C from the retracted position shown in FIG. 15(A) to the deployed position shown in FIG. 15(B). The retracting operation is performed by pressing press-push button 163C, which is extends through a slot 115C defined in a side wall of housing 110C, and manually pulling button 163C backward along slot 115C (i.e., in the direction opposite to arrow S in FIG. 15(A)) to load the linear springs for a future spring-loaded deployment.
FIG. 16 is an exploded perspective view showing a spring-loaded sliding rack assembly of device 100C. The assembly includes a PCBA 120C with USB plug connector 150C mounted thereon, a two-part carrier (slide rack) 160C including a body 161C and a cover (upper wall) 162C, and two linear springs 170C-1 and 170C-2. Note that press-push button 163C extends from a side wall of body 161C. PCBA 120C is mounted into body 161C and then secured by cover 162C. The rear ends of springs 170C-1 and 170C-2 are then attached to structures 165C located on the top and bottom sides of body 161C.
As indicated in FIG. 17, assembly 160C is then mounted between lower housing 110C-1 and upper housing 110C-2 such that front ends of the springs (e.g., spring 170C-2) are attached to corresponding structures (e.g., structure 116C-1) disposed on the inside surfaces of the housing portions, and such that press-push button 163C is disposed in a slot formed by slot portions 115C-1 and 115C-2.
FIGS. 18(A) and 18(B) are perspective top views showing a portable computer peripheral device 100D having a retractable USB plug connector 150D and a side-mounted spring-pressed button 163D according to another specific embodiment of the present invention. Similar to the embodiment described above with reference to FIGS. 15(A) to 17, in a fully retracted position, USB plug connector 150D is retracted through a front opening 112D defined by elongated housing 110D, and press-push button 163D is integrally connected to a positioning member (not shown, described below) and is partially exposed through a slot 115D to facilitate manual movement from the fully retracted (first) position shown in FIG. 18(A), to the fully deployed (second) position shown in FIG. 18(B). However, device 100D includes a pair of linear springs disposed in housing 110D that bias plug connector 150D from the deployed position shown in FIG. 18(B) to the retracted position shown in FIG. 18(A). The deploying operation is performed by pressing press-push button 163D, which extends through a slot 115D defined in a side wall of housing 110D, and manually pushing forward, which causes button 163D to slide along slot 115D (i.e., in the direction of arrow S in FIG. 18(A)) to load the linear springs for a future spring-loaded retraction.
FIG. 19 is an exploded perspective view showing device 100D in additional detail. Similar to the previous embodiment, a sliding rack assembly includes a PCBA 120D with USB plug connector 150D mounted thereon, a two-part carrier (slide rack) 160D including a body 161D and a cover (upper wall) 162D, and two linear springs 170D-1 and 170D-2, with press-push button 163D extending from a side wall of body 161D. PCBA 120D is mounted into body 161D and then secured by cover 162D in the manner described above, but the front ends of springs 170D-1 and 170D-2 are then attached to structures 165D-1 and 165D-2 located on cover 162D and the bottom side of body 161D. The assembly is then mounted between lower housing 110D-1 and upper housing 110D-2 such that rear ends of the springs are attached to corresponding structures (e.g., structure 116D-1) disposed on the inside surfaces of the housing portions, and such that press-push button 163D is disposed in a slot formed by slot portions 115D-1 and 115D-2.
FIGS. 20(A) and 20(B) are perspective top views showing a portable computer peripheral device 100E having a retractable USB plug connector 150E and a rear-mounted spring-pressed button 163E according to another specific embodiment of the present invention. Similar to the embodiments described above, in a fully retracted position, USB plug connector 150E is retracted through a front opening 112E defined by elongated housing 110E, and press-push button 163E is integrally connected to a positioning member (not shown, described below) and is partially exposed through a rear opening 115E to facilitate manual movement from the fully retracted (first) position shown in FIG. 20(A), to the fully deployed (second) position shown in FIG. 20(B). Also, similar to the retracing-type devices described above, device 100E includes at least one linear springs disposed in housing 110E that biases plug connector 150E from the deployed position shown in FIG. 20(B) to the retracted position shown in FIG. 20(A). The deploying operation is performed by pressing press-push button 163E, which extends through a rear opening 115E defined in housing 110E, and manually pushing forward, which causes button 163E to move toward housing 110E (i.e., in the direction of arrow S in FIG. 15(A)) to load the linear spring(s) for a future spring-loaded retraction.
FIG. 21 is an exploded perspective view showing a spring-loaded sliding rack assembly of device 100E. The assembly includes a PCBA 120E with USB plug connector 150E mounted thereon, one linear springs 170E, and a two-part carrier (slide rack) including a lower carrier portion 160E-1 and an upper carrier portion 160E-2, which respectively include lower button portion 163E-1 and upper button portion 163E-2. PCBA 120C is mounted between lower carrier portion 160E-1 and upper carrier portion 160E-2, which are then snap-coupled in a manner similar to that used to connect housing portions in previously described embodiments. The front end of spring 170E is then attached to a structure similar to that described above that is disposed on the lower side (not shown) of lower carrier portion 160E-1.
As indicated in FIG. 22, assembly 160E is then mounted between lower housing 110E-1 and upper housing 110E-2 such that rear end of the spring (not shown, disposed on the lower side of assembly 160E) is attached to structure 116E-1 disposed on the inside surfaces of lower housing portion 110E-1, and such that press-push button 163E is disposed in an opening formed by rear opening portions 115E-1 and 115E-2.
FIGS. 23(A) and 23(B) are perspective top views showing a portable computer peripheral device 100F having a retractable USB plug connector 150F and a rear-mounted spring-pressed button 163F according to another specific embodiment of the present invention. Similar to the embodiments described above, a deploying operation is performed by pressing press-push button 163F, which extends through a rear opening 115F defined in housing 110F, and manually pushing forward, which causes button 163F to move toward housing 110F (i.e., in the direction of arrow S in FIG. 15(A)) to load the linear spring(s) for a future spring-loaded retraction.
FIGS. 24(A) to 24(C) are exploded perspective views showing alternatives PCBA 120F to 120H and alternative USB plug connectors 150F to 150H according to alternative embodiments of the invention. As described previously, a sliding rack assembly includes a PCBA (e.g., 120A; see FIG. 9), a USB plug connector (e.g., connector 150A; see FIG. 9), a slide rack (e.g., positioning member 160A; see FIG. 9), and two linear springs (e.g., springs 170A-1 and 170A-2; see FIG. 9). Similar arrangements are described above with reference to the various additional embodiments. In accordance with additional alternative embodiments of the present invention, PCBAs 120A-E and USB plug connectors 150A-E of these various embodiments can be replaced by alternative PCBAs 120F to 120H and connectors 150F to 150H shown in FIGS. 24(A) to 24(C). In particular, FIG. 24(A) shows a Chip-On-Board (COB) PCBA 120F and a standard metal USB plug 150F, wherein COB PCBA 120F includes the memory, I/O and processor circuits described above that are mounted in chip (i.e., unpackaged) form onto a printed circuit board substrate, and then overmolded with a suitable plastic material. Similarly, FIG. 24(B) shows a Slim Printed Circuit Board Assembly (Slim PCBA) 120G and a modified metal USB plug shell 150G, and FIG. 24(C) shows a Chip-On-Board (COB) PCBA 120H and a COB carrier 150H.
An alternative method for joining top and bottom housings in the above-described embodiments include ultrasonic welding using known techniques. The materials of the top and bottom housing to use in this process may be made of thermoplastic materials such as Acrylonitrile Butadiene Styrene (ABS), ABS/polycarbonate alloy, polyester, Polyvinyl chloride (PVC), Nylon and Nylon with fiberglass. Ultrasonic bonders are applied, e.g., on the flat edges of the side walls of the bottom housing to serve as the initial melting point as an ultrasonic wave from welding machine generates high frequency vibration between the ultrasonic bonder and the top housing.
Some portions of the preceding detailed descriptions have been presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the ways used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the above discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Embodiments of the present invention also relate to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable medium. A machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine-readable (e.g., computer-readable) medium includes a machine (e.g., a computer) readable storage medium (e.g., read only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices, etc.), a machine (e.g., computer) readable transmission medium (electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.)), etc.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general-purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method operations. The required structure for a variety of these systems will appear from the description below. In addition, embodiments of the present invention are not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of embodiments of the invention as described herein.
Although the present invention has been described with reference to specific embodiments thereof, these embodiments are merely illustrative, and not restrictive of, the present invention. Various modifications or changes to the specifically disclosed exemplary embodiments will be suggested to persons skilled in the art. For example, whereas a USB connector has been shown and described, other types of connectors such as a Secure Digital (SD) interface circuit, a Micro SD interface circuit, a Multi Media Card (MMC) interface circuit, a Compact Flash (CF) interface circuit, a Memory Stick (MS) interface circuit, a PCI-Express interface circuit, an Integrated Drive Electronics (IDE) interface circuit, a Serial Advanced technology Attachment (SATA) interface circuit, an external SATA interface circuit, a Radio Frequency Identification (RFID) interface circuit, a fiber channel interface circuit, and an optical connection interface circuit may be used to achieve the same function. Additionally, whereas the size of the data area of a page has been shown to hold four sectors of 512-data, a page holds other number of sectors such as eight may be used. In summary, the scope of the invention should not be restricted to the specific exemplary embodiments disclosed herein, and all modifications that are readily suggested to those of ordinary skill in the art should be included within the spirit and purview of this application and scope of the appended claims.

Claims (13)

1. A portable computer peripheral apparatus comprising:
an elongated housing defining a first opening and a front end portion defining a second opening;
at least one electronic device mounted inside of the housing;
a plug connector movably connected to the housing and electronically connected to said at least one electronic device; and
a spring-loaded mechanism including: a positioning member including: a base portion, a flexible wall connected to the base portion such that the flexible wall is resiliently bendable relative to the base portion, first and second side walls fixedly connected to the base portion, and an actuating button disposed on the flexible wall and protruding through the first opening for manually moving the plug connector between a first position, in which the plug connector is positioned inside of the housing, and a second position in which the plug connector extends through the end opening such that both the plug connector is exposed outside of the housing, and wherein the spring loaded mechanism includes a resilient member for biasing the plug connector between the first position and the second position, the resilient member including first and second linear springs disposed on opposing sides of the positioning member such that the first and second springs are parallel to and in contact with the first and second side walls, respectively.
2. The portable computer peripheral apparatus according to claim 1, wherein the resilient member includes a first end connected to a front portion of the housing, and a second end coupled to the plug connector, whereby the resilient member biases the plug connector from the first position to the second position.
3. The portable computer peripheral apparatus according to claim 1, wherein the resilient member includes a first end connected to a rear portion of the housing, and a second end coupled to the plug connector, whereby the resilient member biases the plug connector from the second position to the first position.
4. The portable computer peripheral apparatus according to claim 1, wherein the spring-loaded mechanism comprises an assembly including said a positioning member and a printed circuit board assembly (PCBA), where the plug connector is fixed connected to a front end of the PCBA, the at least one electronic device is mounted on the PCBA, and the actuating button is integrally formed on or attached to the sliding rack.
5. The portable computer peripheral apparatus according to claim 4, wherein the positioning member further comprises first and second elongated side grooves extending along said first and second side walls, respectively, and wherein the first and second linear springs disposed in the first and second side grooves, respectively.
6. The apparatus of claim 1, wherein the positioning member further comprises: a flexible wall connected to the base portion such that the flexible wall is resiliently bendable relative to the base portion, wherein the actuating button comprises a press-push button disposed on the flexible wall such that when the press-push button is pressed into the housing, the first and second slide rails press against a first inside surface of the housing such that the flexible wall bends into the housing.
7. The apparatus of claim 6, wherein the positioning member further comprises a first locking structure disposed on the flexible wall, wherein the housing further comprises a second locking structure and a third locking structure, and wherein the positioning member is mounted in the housing such that the first locking structure engages the second locking structure when the plug connector is in the first position, and such that the first locking structure engages the third locking structure when the plug connector is in the second position.
8. The apparatus of claim 6, wherein the housing comprises a top wall and an opposing bottom wall having a first width, and opposing side walls having a second width and forming a rectangular cross section with said top and bottom walls, and wherein the press-push button protrudes through a slot defined in said top wall.
9. The apparatus of claim 6 , wherein the housing comprises a top wall and an opposing bottom wall having a first width, and opposing side walls having a second width and forming a rectangular cross section with said top and bottom walls, and wherein the press-push button protrudes through a slot defined in one of said side walls.
10. The apparatus of claim 6, wherein the housing comprises a top wall, an opposing bottom wall, and opposing side walls forming a rectangular cross-section, and wherein the press-push button protrudes through a rear opening disposed opposite to said front end opening.
11. The apparatus of claim 1, wherein said at least one electronic device disposed in a Chip-On-Board (COB) package.
12. The apparatus of claim 1, wherein said at least one electronic device disposed in a Slim Printed Circuit Board Assembly (Slim PCBA) package.
13. The apparatus of claim 1, wherein the plug connector comprises a Universal Serial Bus (USB) plug.
US12/361,772 2004-01-20 2009-01-29 Flash drive with spring-loaded retractable connector Expired - Fee Related US7869219B2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US12/361,772 US7869219B2 (en) 2004-01-20 2009-01-29 Flash drive with spring-loaded retractable connector
US12/505,327 US7850468B2 (en) 2007-06-28 2009-07-17 Lipstick-type USB device
US12/629,002 US8241047B2 (en) 2007-10-30 2009-12-01 Flash drive with spring-loaded swivel connector
US12/834,647 US7944702B2 (en) 2007-08-27 2010-07-12 Press-push flash drive apparatus with metal tubular casing and snap-coupled plastic sleeve
US12/943,892 US8116083B2 (en) 2007-12-04 2010-11-10 Lipstick-type USB device with tubular housing

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US10/761,853 US20050160218A1 (en) 2004-01-20 2004-01-20 Highly integrated mass storage device with an intelligent flash controller
US11/466,759 US7702831B2 (en) 2000-01-06 2006-08-23 Flash memory controller for electronic data flash card
US11/682,261 US7420803B2 (en) 2000-01-06 2007-03-05 Universal serial bus flash drive with deploying and retracting functionalities
US11/845,747 US20070292009A1 (en) 1999-08-04 2007-08-27 Press/Push USB Flash Drive With Deploying And Retracting Functionalities With Elasticity Material And Fingerprint Verification Capability
US11/950,190 US8014130B1 (en) 2004-02-26 2007-12-04 Pen-like universal serial bus (USB) flash drive with deploying and retracting functionalities
US12/025,706 US7886108B2 (en) 2000-01-06 2008-02-04 Methods and systems of managing memory addresses in a large capacity multi-level cell (MLC) based flash memory device
US12/050,748 US7628622B2 (en) 1999-08-04 2008-03-18 Multi-level cell (MLC) slide flash memory
US12/171,194 US7771215B1 (en) 2003-12-02 2008-07-10 MLC COB USB flash memory device with sliding plug connector
US12/361,772 US7869219B2 (en) 2004-01-20 2009-01-29 Flash drive with spring-loaded retractable connector

Related Parent Applications (3)

Application Number Title Priority Date Filing Date
US11/929,857 Continuation-In-Part US8095971B2 (en) 1999-08-04 2007-10-30 Universal serial bus (USB) flash drive having locking pins and locking grooves for locking swivel cap
US12/025,706 Continuation-In-Part US7886108B2 (en) 1999-08-04 2008-02-04 Methods and systems of managing memory addresses in a large capacity multi-level cell (MLC) based flash memory device
US12/171,194 Continuation-In-Part US7771215B1 (en) 2003-12-02 2008-07-10 MLC COB USB flash memory device with sliding plug connector

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US12/505,327 Continuation-In-Part US7850468B2 (en) 2007-06-28 2009-07-17 Lipstick-type USB device
US12/629,002 Continuation-In-Part US8241047B2 (en) 2007-10-30 2009-12-01 Flash drive with spring-loaded swivel connector
US12/834,647 Continuation-In-Part US7944702B2 (en) 2007-08-27 2010-07-12 Press-push flash drive apparatus with metal tubular casing and snap-coupled plastic sleeve

Publications (2)

Publication Number Publication Date
US20090177835A1 US20090177835A1 (en) 2009-07-09
US7869219B2 true US7869219B2 (en) 2011-01-11

Family

ID=40845503

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/361,772 Expired - Fee Related US7869219B2 (en) 2004-01-20 2009-01-29 Flash drive with spring-loaded retractable connector

Country Status (1)

Country Link
US (1) US7869219B2 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070292009A1 (en) * 1999-08-04 2007-12-20 Super Talent Electronics, Inc. Press/Push USB Flash Drive With Deploying And Retracting Functionalities With Elasticity Material And Fingerprint Verification Capability
US20090316368A1 (en) * 2007-07-05 2009-12-24 Super Talent Electronics, Inc. USB Package With Bistable Sliding Mechanism
US20100124831A1 (en) * 2008-11-15 2010-05-20 Peter Chou Sliding sleeve USB
US20110281473A1 (en) * 2010-05-14 2011-11-17 Hon Hai Precision Industry Co., Ltd. Universal serial bus interface
US20120008272A1 (en) * 2010-07-09 2012-01-12 Chi Mei Communication Systems, Inc. Portable storage device
US20120100822A1 (en) * 2010-10-25 2012-04-26 Bandrich, Inc. Wireless network receiver for selectively receiving or exposing an electrical connector
US20120155721A1 (en) * 2009-12-03 2012-06-21 Huawei Device Co., Ltd Fingerprint Identification Data Card and Electronic Device
US20120225569A1 (en) * 2009-11-11 2012-09-06 Huawei Device Co.,Ltd. Electronic apparatus with plug
US20120310446A1 (en) * 2011-06-03 2012-12-06 Linda Murphy Murlin
US20130094137A1 (en) * 2011-10-18 2013-04-18 Lite-On Technology Corporation Data storage device
US8625270B2 (en) 1999-08-04 2014-01-07 Super Talent Technology, Corp. USB flash drive with deploying and retracting functionalities using retractable cover/cap
US20140082246A1 (en) * 2011-10-26 2014-03-20 Huawei Device Co., Ltd. Data Terminal With a Connection Structure of USB Interface
US20160111828A1 (en) * 2014-10-15 2016-04-21 Cvilux Corporation Usb device
US9337562B1 (en) * 2014-12-10 2016-05-10 Adata Technology Co., Ltd. Pressable portable storage device
US9395768B2 (en) * 2014-08-21 2016-07-19 Phison Electronics Corp. Flash drive
US20160364141A1 (en) * 2015-06-12 2016-12-15 Phison Electronics Corp. Memory management method, memory control circuit unit, and memory storage apparatus
US9735494B2 (en) 2014-04-30 2017-08-15 Te Connectivity Corporation Pluggable connector having a protective front wall
US10306796B2 (en) * 2017-11-01 2019-05-28 Dell Products L.P. Information handling system rail clip automatic clamping
US10359814B2 (en) * 2017-11-03 2019-07-23 International Business Machines Corporation Extendable structure for protecting electrical connectors
US10716225B1 (en) * 2019-06-26 2020-07-14 Western Digital Technologies, Inc. Data storage devices and connectors for same
US20210282288A1 (en) * 2018-10-10 2021-09-09 Hewlett-Packard Development Company, L.P. Apparatuses with linearly movable jaws
US11375625B2 (en) * 2018-04-19 2022-06-28 Innolux Corporation Electronic apparatus

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8408436B2 (en) * 2007-09-07 2013-04-02 Nike, Inc. Wearable device assembly having athletic functionality
TWM348311U (en) * 2008-08-20 2009-01-01 Jw Electronics Co Ltd Nonvolatile storage device
KR20100091544A (en) * 2009-02-10 2010-08-19 삼성전자주식회사 Memory system and wear leveling method thereof
CN201397897Y (en) * 2009-03-31 2010-02-03 深圳华为通信技术有限公司 Electronic device with USB adapter
KR101064118B1 (en) 2011-03-31 2011-09-16 (주) 이모텔리 Retractable usb memory
USD673963S1 (en) 2011-10-19 2013-01-08 MIMOCO, Inc. USB drive
USD673962S1 (en) 2011-10-24 2013-01-08 MIMOCO, Inc. USB drive and card reader with body
US20150261444A1 (en) * 2014-03-12 2015-09-17 Kabushiki Kaisha Toshiba Memory system and information processing device
CN113573527B (en) * 2021-08-02 2022-10-04 广东培正学院 Computer network control box

Citations (112)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4582985A (en) 1981-03-18 1986-04-15 Loefberg Bo Data carrier
US4630201A (en) 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number
US4766293A (en) 1986-06-26 1988-08-23 Visa International Service Association Portable financial transaction card capable of authorizing a transaction in foreign currencies
US4833554A (en) 1987-02-25 1989-05-23 Tandon Corporation Hard disk drive module and receptacle therefor
US4926480A (en) 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems
US5020105A (en) 1986-06-16 1991-05-28 Applied Information Technologies Corporation Field initialized authentication system for protective security of electronic information networks
US5180901A (en) 1990-05-21 1993-01-19 Kabushiki Kaisha Toshiba IC card with individual authentication function
US5280527A (en) 1992-04-14 1994-01-18 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
US5404485A (en) 1993-03-08 1995-04-04 M-Systems Flash Disk Pioneers Ltd. Flash file system
US5430859A (en) 1991-07-26 1995-07-04 Sundisk Corporation Solid state memory system including plural memory chips and a serialized bus
US5479638A (en) 1993-03-26 1995-12-26 Cirrus Logic, Inc. Flash memory mass storage architecture incorporation wear leveling technique
US5623552A (en) 1994-01-21 1997-04-22 Cardguard International, Inc. Self-authenticating identification card with fingerprint identification
US5797771A (en) 1996-08-16 1998-08-25 U.S. Robotics Mobile Communication Corp. Cable connector
US5835760A (en) 1995-10-13 1998-11-10 Texas Instruments Incorporated Method and arrangement for providing BIOS to a host computer
US5899773A (en) 1996-10-07 1999-05-04 Pendec Enterprise Co., Ltd. Connecting device with integrally formed male and female connectors
US5907856A (en) 1995-07-31 1999-05-25 Lexar Media, Inc. Moving sectors within a block of information in a flash memory mass storage architecture
US5959541A (en) 1997-09-23 1999-09-28 Accu-Time Systems, Inc. Biometric time and attendance system with epidermal topographical updating capability
US5984731A (en) 1997-11-17 1999-11-16 Xircom, Inc. Removable I/O device with integrated receptacles for receiving standard plugs
US6000006A (en) 1997-08-25 1999-12-07 Bit Microsystems, Inc. Unified re-map and cache-index table with dual write-counters for wear-leveling of non-volatile flash RAM mass storage
US6012636A (en) 1997-04-22 2000-01-11 Smith; Frank E. Multiple card data system having first and second memory elements including magnetic strip and fingerprints scanning means
US6044428A (en) 1998-03-17 2000-03-28 Fairchild Semiconductor Corporation Configurable universal serial bus node
US6069920A (en) 1994-01-18 2000-05-30 Siemens Aktiengesellschaft Method and arrangement for transmitting voice in a radio system
US6069970A (en) 1997-05-16 2000-05-30 Authentec, Inc. Fingerprint sensor and token reader and associated methods
US6081858A (en) 1997-11-26 2000-06-27 Cirrus Logic, Inc. Apparatus and method for shaping random waveforms
US6125192A (en) 1997-04-21 2000-09-26 Digital Persona, Inc. Fingerprint recognition system
US6132243A (en) 1997-10-09 2000-10-17 Molex Incorporated Card connector assembly
US6148354A (en) 1999-04-05 2000-11-14 M-Systems Flash Disk Pioneers Ltd. Architecture for a universal serial bus-based PC flash disk
US6159039A (en) 1998-12-18 2000-12-12 Hon Hai Precision Ind. Co., Ltd. Stacked electrical connector assembly
US6193152B1 (en) 1997-05-09 2001-02-27 Receiptcity.Com, Inc. Modular signature and data-capture system and point of transaction payment and reward system
US6202138B1 (en) 1995-07-31 2001-03-13 Lexar Media, Inc Increasing the memory performance of flash memory devices by writing sectors simultaneously to multiple flash memory devices
US6230233B1 (en) 1991-09-13 2001-05-08 Sandisk Corporation Wear leveling techniques for flash EEPROM systems
US6275894B1 (en) 1998-09-23 2001-08-14 Advanced Micro Devices, Inc. Bank selector circuit for a simultaneous operation flash memory device with a flexible bank partition architecture
US6279955B1 (en) 1999-04-16 2001-08-28 Container Products Corporation Mobile storage tank
US6292863B1 (en) 1998-01-08 2001-09-18 Tdk Corporation PC card
US20010043174A1 (en) 1996-10-31 2001-11-22 Jeffrey Jacobsen Display system for wireless pager
US6321478B1 (en) 1998-12-04 2001-11-27 Smith & Wesson Corp. Firearm having an intelligent controller
US6334793B1 (en) 1997-02-27 2002-01-01 International Business Machines Corporation Enhanced universal serial bus
US20020036922A1 (en) 2000-07-28 2002-03-28 Micron Technology, Inc. Method and circuitry for bank tracking in write command sequence
US6438638B1 (en) 2000-07-06 2002-08-20 Onspec Electronic, Inc. Flashtoaster for reading several types of flash-memory cards with or without a PC
US6456500B1 (en) 2001-12-05 2002-09-24 Speed Tech Corp. Assembling structure for portable memory device
US20020166023A1 (en) 1999-04-15 2002-11-07 Dell Products, L.P. High speed bus interface for non-volatile integrated circuit memory supporting continuous transfer
US6480390B2 (en) 2000-02-29 2002-11-12 Fujitsu Takamisawa Component Limited Card-type peripheral device
US20030046510A1 (en) 2001-03-30 2003-03-06 North Gregory Allen System-on-a-chip with soft cache and systems and methods using the same
US6547130B1 (en) 1999-06-03 2003-04-15 Ming-Shiang Shen Integrated circuit card with fingerprint verification capability
US6554648B2 (en) 2000-06-08 2003-04-29 Hon Hai Precision Ind. Co., Ltd. Universal serial bus receptacle connector
US6567273B1 (en) 2002-02-06 2003-05-20 Carry Computer Eng. Co., Ltd. Small silicon disk card with a USB plug
US20030100203A1 (en) 2001-11-23 2003-05-29 Power Quotient International Co., Ltd. Low height USB interface connecting device and a memory storage apparatus thereof
US20030163656A1 (en) 2002-02-26 2003-08-28 Ganton Robert Bruce Memory configuration for a wireless communications device
US6615404B1 (en) 1999-05-13 2003-09-02 Tadiran Telecom Business Systems Ltd. Method and apparatus for downloading software into an embedded-system
US6618243B1 (en) 2002-06-13 2003-09-09 M-Systems Flash Disk Pioneers Ltd. Computer peripheral system for interconnection with pocketable personal articles
US20030177300A1 (en) 2002-03-18 2003-09-18 Samsung Electro-Mechanics Co., Ltd. Data processing method in high-capacity flash EEPROM card system
US20030182528A1 (en) 2002-03-20 2003-09-25 Nec Electronics Corporation Single-chip microcomputer
US6636929B1 (en) 2000-04-06 2003-10-21 Hewlett-Packard Development Company, L.P. USB virtual devices
US20040034765A1 (en) 2002-08-14 2004-02-19 James O?Apos;Connell Daniel Method and apparatus for booting a computer system
US6718407B2 (en) 1999-09-30 2004-04-06 Intel Corporation Multiplexer selecting one of input/output data from a low pin count interface and a program information to update a firmware device from a communication interface
US6737591B1 (en) 1999-05-25 2004-05-18 Silverbrook Research Pty Ltd Orientation sensing device
US6743030B2 (en) 2002-09-30 2004-06-01 Asia Vital Components Co., Ltd. Portable storage device with universal serial bus
US6763410B2 (en) 2002-10-28 2004-07-13 Walton Advanced Engineering, Inc. Portable universal serial bus memory device
US20040148482A1 (en) 2003-01-13 2004-07-29 Grundy Kevin P. Memory chain
US20040153595A1 (en) 2003-01-31 2004-08-05 Toshiba Corporation USB memory storage apparatus
US6778401B1 (en) 2003-01-24 2004-08-17 C-One Technology Corp. Mini-type connector of circuit substrate
USD494969S1 (en) 2003-08-11 2004-08-24 Benq Corporation USB flash memory drive
US6792487B2 (en) 2002-11-22 2004-09-14 Chia-Hung Kao Universal serial bus (USB) connector connecting structure for a multi-function device
US6808400B2 (en) * 2002-10-18 2004-10-26 Aiptek International Inc. USB connector structure with protection means
US20040255054A1 (en) 2003-06-10 2004-12-16 Khein-Seng Pua High-speed data transmission device
US20050009388A1 (en) 2003-07-08 2005-01-13 Technology Corp. Usb mobile disk-pen
US6854984B1 (en) 2003-09-11 2005-02-15 Super Talent Electronics, Inc. Slim USB connector with spring-engaging depressions, stabilizing dividers and wider end rails for flash-memory drive
US6880024B2 (en) 2003-06-12 2005-04-12 Phison Electronics Corp. Control system for memory storage device having two different interfaces
US20050085133A1 (en) 2003-09-11 2005-04-21 Kuang-Yu Wang Low-profile USB connector without metal case
US20050102444A1 (en) 2003-11-07 2005-05-12 Cruz Arnaldo R. Memory controller useable in a data processing system
US20050114587A1 (en) 2003-11-22 2005-05-26 Super Talent Electronics Inc. ExpressCard with On-Card Flash Memory with Shared Flash-Control Bus but Separate Ready Lines
US20050120146A1 (en) 2003-12-02 2005-06-02 Super Talent Electronics Inc. Single-Chip USB Controller Reading Power-On Boot Code from Integrated Flash Memory for User Storage
US20050160213A1 (en) 2004-01-21 2005-07-21 Chen Ben W. Method and system for providing a modular server on USB flash storage
US20050182858A1 (en) 2004-02-13 2005-08-18 Incomm Technologies Co., Ltd. Portable memory device with multiple I/O interfaces
US20050193162A1 (en) 2004-02-26 2005-09-01 Horng-Yee Chou USB card reader
US20050193161A1 (en) 2004-02-26 2005-09-01 Lee Charles C. System and method for controlling flash memory
US20050216624A1 (en) 2002-09-26 2005-09-29 Guoshun Deng Device and method for providing data exchange and storage
US20050246243A1 (en) 2004-04-30 2005-11-03 Adams Neil P System and method for handling peripheral connections to mobile devices
US20050268082A1 (en) 2000-04-28 2005-12-01 Poisner David I Method and apparatus to boot system from the USB port
US20050271458A1 (en) 2004-06-04 2005-12-08 Weiliang Kui Multi-functional pen
US7004780B1 (en) 2004-05-13 2006-02-28 Super Talent Electronics, Inc. Portable computer peripheral apparatus with retractable plug connector
US20060065743A1 (en) 2004-09-30 2006-03-30 Stmicroelectronics, Inc. USB device with secondary USB on-the-go function
US7021971B2 (en) 2003-09-11 2006-04-04 Super Talent Electronics, Inc. Dual-personality extended-USB plug and receptacle with PCI-Express or Serial-At-Attachment extensions
US20060075174A1 (en) 2004-10-06 2006-04-06 Mr. Cory Vuong Vuong Method and aparatus for plug-and-play webserver
US7044802B2 (en) 2003-09-11 2006-05-16 Super Talent Electronics, Inc. USB flash-memory card with perimeter frame and covers that allow mounting of chips on both sides of a PCB
US20060106962A1 (en) 2004-11-17 2006-05-18 Woodbridge Nancy G USB On-The-Go implementation
US7074052B1 (en) 2005-05-11 2006-07-11 Super Talent Electronics, Inc. USB device with case having integrated plug shell
US20060161725A1 (en) 2005-01-20 2006-07-20 Lee Charles C Multiple function flash memory system
US7090541B1 (en) 2005-05-27 2006-08-15 Inventec Multimedia & Telecom Corporation Slim USB electronic device
US7097472B2 (en) 2004-09-08 2006-08-29 Hewlett-Packard Development Company, L.P. Universal serial bus plug
US7103765B2 (en) 2001-09-25 2006-09-05 Ben Wei Chen Method and system for providing a modulized server on board
US20060206702A1 (en) 2005-03-09 2006-09-14 Wyse Technology Inc. Operating system boot from external media
US20060234533A1 (en) 2005-04-14 2006-10-19 Hon Hai Precision Ind. Co., Ltd. Portable memory device with protective cap
US20060242395A1 (en) 2005-03-09 2006-10-26 Wyse Technology Inc. Operating system boot from network location
US7155545B1 (en) 2005-12-29 2006-12-26 Via Technologies, Inc. USB connector
US7172460B2 (en) 2004-12-28 2007-02-06 Hon Hai Precision Ind. Co., Ltd. Universal serial bus connector with integral shell
US20070079043A1 (en) 2003-12-02 2007-04-05 Super Talent Electronics Inc. Single-Chip Multi-Media Card/Secure Digital (MMC/SD) Controller Reading Power-On Boot Code from Integrated Flash Memory for User Storage
US20070094489A1 (en) 2005-10-21 2007-04-26 Sony Corporation Embedded system that boots from USB flash drive
US7214075B2 (en) 2005-07-15 2007-05-08 Hon Hai Precision Ind. Co., Ltd. Portable memory device with waterproof structure
US20070113267A1 (en) 2005-11-14 2007-05-17 Route1 Inc. Portable device for accessing host computer via remote computer
US20070113067A1 (en) 2005-11-15 2007-05-17 Jee-Woong Oh Method and apparatus for booting a microprocessor system using boot code stored on a serial flash memory array having a random-access interface
US20070130436A1 (en) 1999-10-19 2007-06-07 Super Talent Electronics, Inc. Electronic Data Storage Medium With Fingerprint Verification Capability
US7249978B1 (en) 2005-10-24 2007-07-31 Super Talent Electronics, Inc. Reduced-length, low-profile USB device and card-like carrier
US7259967B2 (en) 2005-09-02 2007-08-21 Super Talent Electronics, Inc. USB device with plastic housing having integrated plastic plug shell
US7264992B2 (en) 2004-08-06 2007-09-04 Paul Hsueh Removable flash integrated memory module card and method of manufacture
US7359208B2 (en) 2005-08-26 2008-04-15 Super Talent Electronics, Inc. USB device with metal plug shell attached to plastic housing
US7361059B2 (en) 2003-07-28 2008-04-22 Sandisk Secure Content Solutions, Inc Electrical connector
US20090124104A1 (en) 2007-11-12 2009-05-14 Hon Hai Precision Ind. Co., Ltd. Flash memory device with a retractable plug
US7632113B2 (en) * 2003-11-17 2009-12-15 Dpd Patent Trust Ltd. Retractable USB stick
US7704084B1 (en) * 2009-04-06 2010-04-27 Chieh-Yu Cheng USB connector extension/retraction device for USB flash drive
US20100124831A1 (en) 2008-11-15 2010-05-20 Peter Chou Sliding sleeve USB
US7778037B2 (en) * 2007-09-27 2010-08-17 Phison Electronics Corp. Dual-interface data storage apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4530859A (en) * 1981-12-23 1985-07-23 Minnesota Mining And Manufacturing Company Method of preparing a polymeric coating composition from a blocked isocyanate-functional polymeric compound and a crosslinking agent which is insoluble in aprotic solvents
WO2000051978A1 (en) * 1999-03-01 2000-09-08 Nitromed, Inc. Nitrosated and nitrosylated prostaglandins, compositions and metods of use

Patent Citations (119)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4582985A (en) 1981-03-18 1986-04-15 Loefberg Bo Data carrier
US4926480A (en) 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems
US4630201A (en) 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number
US5020105A (en) 1986-06-16 1991-05-28 Applied Information Technologies Corporation Field initialized authentication system for protective security of electronic information networks
US4766293A (en) 1986-06-26 1988-08-23 Visa International Service Association Portable financial transaction card capable of authorizing a transaction in foreign currencies
US4833554A (en) 1987-02-25 1989-05-23 Tandon Corporation Hard disk drive module and receptacle therefor
US5180901A (en) 1990-05-21 1993-01-19 Kabushiki Kaisha Toshiba IC card with individual authentication function
US5430859A (en) 1991-07-26 1995-07-04 Sundisk Corporation Solid state memory system including plural memory chips and a serialized bus
US6230233B1 (en) 1991-09-13 2001-05-08 Sandisk Corporation Wear leveling techniques for flash EEPROM systems
US5280527A (en) 1992-04-14 1994-01-18 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
US5404485A (en) 1993-03-08 1995-04-04 M-Systems Flash Disk Pioneers Ltd. Flash file system
US5479638A (en) 1993-03-26 1995-12-26 Cirrus Logic, Inc. Flash memory mass storage architecture incorporation wear leveling technique
US6069920A (en) 1994-01-18 2000-05-30 Siemens Aktiengesellschaft Method and arrangement for transmitting voice in a radio system
US5623552A (en) 1994-01-21 1997-04-22 Cardguard International, Inc. Self-authenticating identification card with fingerprint identification
US5907856A (en) 1995-07-31 1999-05-25 Lexar Media, Inc. Moving sectors within a block of information in a flash memory mass storage architecture
US6202138B1 (en) 1995-07-31 2001-03-13 Lexar Media, Inc Increasing the memory performance of flash memory devices by writing sectors simultaneously to multiple flash memory devices
US5835760A (en) 1995-10-13 1998-11-10 Texas Instruments Incorporated Method and arrangement for providing BIOS to a host computer
US5797771A (en) 1996-08-16 1998-08-25 U.S. Robotics Mobile Communication Corp. Cable connector
US5899773A (en) 1996-10-07 1999-05-04 Pendec Enterprise Co., Ltd. Connecting device with integrally formed male and female connectors
US20010043174A1 (en) 1996-10-31 2001-11-22 Jeffrey Jacobsen Display system for wireless pager
US6334793B1 (en) 1997-02-27 2002-01-01 International Business Machines Corporation Enhanced universal serial bus
US6125192A (en) 1997-04-21 2000-09-26 Digital Persona, Inc. Fingerprint recognition system
US6012636A (en) 1997-04-22 2000-01-11 Smith; Frank E. Multiple card data system having first and second memory elements including magnetic strip and fingerprints scanning means
US6193152B1 (en) 1997-05-09 2001-02-27 Receiptcity.Com, Inc. Modular signature and data-capture system and point of transaction payment and reward system
US6069970A (en) 1997-05-16 2000-05-30 Authentec, Inc. Fingerprint sensor and token reader and associated methods
US6000006A (en) 1997-08-25 1999-12-07 Bit Microsystems, Inc. Unified re-map and cache-index table with dual write-counters for wear-leveling of non-volatile flash RAM mass storage
US5959541A (en) 1997-09-23 1999-09-28 Accu-Time Systems, Inc. Biometric time and attendance system with epidermal topographical updating capability
US6132243A (en) 1997-10-09 2000-10-17 Molex Incorporated Card connector assembly
US5984731A (en) 1997-11-17 1999-11-16 Xircom, Inc. Removable I/O device with integrated receptacles for receiving standard plugs
US6081858A (en) 1997-11-26 2000-06-27 Cirrus Logic, Inc. Apparatus and method for shaping random waveforms
US6292863B1 (en) 1998-01-08 2001-09-18 Tdk Corporation PC card
US6044428A (en) 1998-03-17 2000-03-28 Fairchild Semiconductor Corporation Configurable universal serial bus node
US6275894B1 (en) 1998-09-23 2001-08-14 Advanced Micro Devices, Inc. Bank selector circuit for a simultaneous operation flash memory device with a flexible bank partition architecture
US6321478B1 (en) 1998-12-04 2001-11-27 Smith & Wesson Corp. Firearm having an intelligent controller
US6159039A (en) 1998-12-18 2000-12-12 Hon Hai Precision Ind. Co., Ltd. Stacked electrical connector assembly
US6148354A (en) 1999-04-05 2000-11-14 M-Systems Flash Disk Pioneers Ltd. Architecture for a universal serial bus-based PC flash disk
US20020166023A1 (en) 1999-04-15 2002-11-07 Dell Products, L.P. High speed bus interface for non-volatile integrated circuit memory supporting continuous transfer
US6279955B1 (en) 1999-04-16 2001-08-28 Container Products Corporation Mobile storage tank
US6615404B1 (en) 1999-05-13 2003-09-02 Tadiran Telecom Business Systems Ltd. Method and apparatus for downloading software into an embedded-system
US6737591B1 (en) 1999-05-25 2004-05-18 Silverbrook Research Pty Ltd Orientation sensing device
US6547130B1 (en) 1999-06-03 2003-04-15 Ming-Shiang Shen Integrated circuit card with fingerprint verification capability
US6718407B2 (en) 1999-09-30 2004-04-06 Intel Corporation Multiplexer selecting one of input/output data from a low pin count interface and a program information to update a firmware device from a communication interface
US20070130436A1 (en) 1999-10-19 2007-06-07 Super Talent Electronics, Inc. Electronic Data Storage Medium With Fingerprint Verification Capability
US7257714B1 (en) 1999-10-19 2007-08-14 Super Talent Electronics, Inc. Electronic data storage medium with fingerprint verification capability
US6480390B2 (en) 2000-02-29 2002-11-12 Fujitsu Takamisawa Component Limited Card-type peripheral device
US6636929B1 (en) 2000-04-06 2003-10-21 Hewlett-Packard Development Company, L.P. USB virtual devices
US20050268082A1 (en) 2000-04-28 2005-12-01 Poisner David I Method and apparatus to boot system from the USB port
US6554648B2 (en) 2000-06-08 2003-04-29 Hon Hai Precision Ind. Co., Ltd. Universal serial bus receptacle connector
US6438638B1 (en) 2000-07-06 2002-08-20 Onspec Electronic, Inc. Flashtoaster for reading several types of flash-memory cards with or without a PC
US20020036922A1 (en) 2000-07-28 2002-03-28 Micron Technology, Inc. Method and circuitry for bank tracking in write command sequence
US20030046510A1 (en) 2001-03-30 2003-03-06 North Gregory Allen System-on-a-chip with soft cache and systems and methods using the same
US7103765B2 (en) 2001-09-25 2006-09-05 Ben Wei Chen Method and system for providing a modulized server on board
US20030100203A1 (en) 2001-11-23 2003-05-29 Power Quotient International Co., Ltd. Low height USB interface connecting device and a memory storage apparatus thereof
US6456500B1 (en) 2001-12-05 2002-09-24 Speed Tech Corp. Assembling structure for portable memory device
US6567273B1 (en) 2002-02-06 2003-05-20 Carry Computer Eng. Co., Ltd. Small silicon disk card with a USB plug
US20030163656A1 (en) 2002-02-26 2003-08-28 Ganton Robert Bruce Memory configuration for a wireless communications device
US20030177300A1 (en) 2002-03-18 2003-09-18 Samsung Electro-Mechanics Co., Ltd. Data processing method in high-capacity flash EEPROM card system
US20030182528A1 (en) 2002-03-20 2003-09-25 Nec Electronics Corporation Single-chip microcomputer
US6618243B1 (en) 2002-06-13 2003-09-09 M-Systems Flash Disk Pioneers Ltd. Computer peripheral system for interconnection with pocketable personal articles
US20040034765A1 (en) 2002-08-14 2004-02-19 James O?Apos;Connell Daniel Method and apparatus for booting a computer system
US20050216624A1 (en) 2002-09-26 2005-09-29 Guoshun Deng Device and method for providing data exchange and storage
US6743030B2 (en) 2002-09-30 2004-06-01 Asia Vital Components Co., Ltd. Portable storage device with universal serial bus
US6808400B2 (en) * 2002-10-18 2004-10-26 Aiptek International Inc. USB connector structure with protection means
US6763410B2 (en) 2002-10-28 2004-07-13 Walton Advanced Engineering, Inc. Portable universal serial bus memory device
US6792487B2 (en) 2002-11-22 2004-09-14 Chia-Hung Kao Universal serial bus (USB) connector connecting structure for a multi-function device
US20040148482A1 (en) 2003-01-13 2004-07-29 Grundy Kevin P. Memory chain
US6778401B1 (en) 2003-01-24 2004-08-17 C-One Technology Corp. Mini-type connector of circuit substrate
US20060184709A1 (en) 2003-01-31 2006-08-17 Toshiba Corporation USB memory storage apparatus
US7069370B2 (en) 2003-01-31 2006-06-27 Toshiba Corporation USB memory storage apparatus with integrated circuit in a connector
US20040153595A1 (en) 2003-01-31 2004-08-05 Toshiba Corporation USB memory storage apparatus
US20040255054A1 (en) 2003-06-10 2004-12-16 Khein-Seng Pua High-speed data transmission device
US6880024B2 (en) 2003-06-12 2005-04-12 Phison Electronics Corp. Control system for memory storage device having two different interfaces
US20050009388A1 (en) 2003-07-08 2005-01-13 Technology Corp. Usb mobile disk-pen
US7361059B2 (en) 2003-07-28 2008-04-22 Sandisk Secure Content Solutions, Inc Electrical connector
USD494969S1 (en) 2003-08-11 2004-08-24 Benq Corporation USB flash memory drive
US7044802B2 (en) 2003-09-11 2006-05-16 Super Talent Electronics, Inc. USB flash-memory card with perimeter frame and covers that allow mounting of chips on both sides of a PCB
US7182646B1 (en) 2003-09-11 2007-02-27 Super Talent Electronics, Inc. Connectors having a USB-like form factor for supporting USB and non-USB protocols
US20050085133A1 (en) 2003-09-11 2005-04-21 Kuang-Yu Wang Low-profile USB connector without metal case
US7104848B1 (en) 2003-09-11 2006-09-12 Super Talent Electronics, Inc. Extended USB protocol plug and receptacle for implementing multi-mode communication
US7125287B1 (en) 2003-09-11 2006-10-24 Super Talent Electronics, Inc. Extended USB protocol plug and receptacle
US6854984B1 (en) 2003-09-11 2005-02-15 Super Talent Electronics, Inc. Slim USB connector with spring-engaging depressions, stabilizing dividers and wider end rails for flash-memory drive
US7021971B2 (en) 2003-09-11 2006-04-04 Super Talent Electronics, Inc. Dual-personality extended-USB plug and receptacle with PCI-Express or Serial-At-Attachment extensions
US20050102444A1 (en) 2003-11-07 2005-05-12 Cruz Arnaldo R. Memory controller useable in a data processing system
US7632113B2 (en) * 2003-11-17 2009-12-15 Dpd Patent Trust Ltd. Retractable USB stick
US20050114587A1 (en) 2003-11-22 2005-05-26 Super Talent Electronics Inc. ExpressCard with On-Card Flash Memory with Shared Flash-Control Bus but Separate Ready Lines
US7103684B2 (en) 2003-12-02 2006-09-05 Super Talent Electronics, Inc. Single-chip USB controller reading power-on boot code from integrated flash memory for user storage
US20050120146A1 (en) 2003-12-02 2005-06-02 Super Talent Electronics Inc. Single-Chip USB Controller Reading Power-On Boot Code from Integrated Flash Memory for User Storage
US20070079043A1 (en) 2003-12-02 2007-04-05 Super Talent Electronics Inc. Single-Chip Multi-Media Card/Secure Digital (MMC/SD) Controller Reading Power-On Boot Code from Integrated Flash Memory for User Storage
US20050160213A1 (en) 2004-01-21 2005-07-21 Chen Ben W. Method and system for providing a modular server on USB flash storage
US20050182858A1 (en) 2004-02-13 2005-08-18 Incomm Technologies Co., Ltd. Portable memory device with multiple I/O interfaces
US20050193161A1 (en) 2004-02-26 2005-09-01 Lee Charles C. System and method for controlling flash memory
US20050193162A1 (en) 2004-02-26 2005-09-01 Horng-Yee Chou USB card reader
US20050246243A1 (en) 2004-04-30 2005-11-03 Adams Neil P System and method for handling peripheral connections to mobile devices
US7004780B1 (en) 2004-05-13 2006-02-28 Super Talent Electronics, Inc. Portable computer peripheral apparatus with retractable plug connector
US20050271458A1 (en) 2004-06-04 2005-12-08 Weiliang Kui Multi-functional pen
US7264992B2 (en) 2004-08-06 2007-09-04 Paul Hsueh Removable flash integrated memory module card and method of manufacture
US7097472B2 (en) 2004-09-08 2006-08-29 Hewlett-Packard Development Company, L.P. Universal serial bus plug
US20060065743A1 (en) 2004-09-30 2006-03-30 Stmicroelectronics, Inc. USB device with secondary USB on-the-go function
US20060075174A1 (en) 2004-10-06 2006-04-06 Mr. Cory Vuong Vuong Method and aparatus for plug-and-play webserver
US20060106962A1 (en) 2004-11-17 2006-05-18 Woodbridge Nancy G USB On-The-Go implementation
US7172460B2 (en) 2004-12-28 2007-02-06 Hon Hai Precision Ind. Co., Ltd. Universal serial bus connector with integral shell
US20060161725A1 (en) 2005-01-20 2006-07-20 Lee Charles C Multiple function flash memory system
US20060242395A1 (en) 2005-03-09 2006-10-26 Wyse Technology Inc. Operating system boot from network location
US20060206702A1 (en) 2005-03-09 2006-09-14 Wyse Technology Inc. Operating system boot from external media
US20060234533A1 (en) 2005-04-14 2006-10-19 Hon Hai Precision Ind. Co., Ltd. Portable memory device with protective cap
US7074052B1 (en) 2005-05-11 2006-07-11 Super Talent Electronics, Inc. USB device with case having integrated plug shell
US7090541B1 (en) 2005-05-27 2006-08-15 Inventec Multimedia & Telecom Corporation Slim USB electronic device
US7214075B2 (en) 2005-07-15 2007-05-08 Hon Hai Precision Ind. Co., Ltd. Portable memory device with waterproof structure
US7359208B2 (en) 2005-08-26 2008-04-15 Super Talent Electronics, Inc. USB device with metal plug shell attached to plastic housing
US7259967B2 (en) 2005-09-02 2007-08-21 Super Talent Electronics, Inc. USB device with plastic housing having integrated plastic plug shell
US20070094489A1 (en) 2005-10-21 2007-04-26 Sony Corporation Embedded system that boots from USB flash drive
US7249978B1 (en) 2005-10-24 2007-07-31 Super Talent Electronics, Inc. Reduced-length, low-profile USB device and card-like carrier
US20070113267A1 (en) 2005-11-14 2007-05-17 Route1 Inc. Portable device for accessing host computer via remote computer
US20070113067A1 (en) 2005-11-15 2007-05-17 Jee-Woong Oh Method and apparatus for booting a microprocessor system using boot code stored on a serial flash memory array having a random-access interface
US7155545B1 (en) 2005-12-29 2006-12-26 Via Technologies, Inc. USB connector
US7778037B2 (en) * 2007-09-27 2010-08-17 Phison Electronics Corp. Dual-interface data storage apparatus
US20090124104A1 (en) 2007-11-12 2009-05-14 Hon Hai Precision Ind. Co., Ltd. Flash memory device with a retractable plug
US20100124831A1 (en) 2008-11-15 2010-05-20 Peter Chou Sliding sleeve USB
US7704084B1 (en) * 2009-04-06 2010-04-27 Chieh-Yu Cheng USB connector extension/retraction device for USB flash drive

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070292009A1 (en) * 1999-08-04 2007-12-20 Super Talent Electronics, Inc. Press/Push USB Flash Drive With Deploying And Retracting Functionalities With Elasticity Material And Fingerprint Verification Capability
US8625270B2 (en) 1999-08-04 2014-01-07 Super Talent Technology, Corp. USB flash drive with deploying and retracting functionalities using retractable cover/cap
US20090316368A1 (en) * 2007-07-05 2009-12-24 Super Talent Electronics, Inc. USB Package With Bistable Sliding Mechanism
US8102662B2 (en) * 2007-07-05 2012-01-24 Super Talent Electronics, Inc. USB package with bistable sliding mechanism
US20100124831A1 (en) * 2008-11-15 2010-05-20 Peter Chou Sliding sleeve USB
US8194408B2 (en) * 2008-11-15 2012-06-05 Peter Chou Sliding sleeve USB
US20120225569A1 (en) * 2009-11-11 2012-09-06 Huawei Device Co.,Ltd. Electronic apparatus with plug
US8500466B2 (en) * 2009-11-11 2013-08-06 Huawei Device Co., Ltd. Electronic apparatus with plug
US9087278B2 (en) * 2009-12-03 2015-07-21 Huawei Device Co., Ltd. Fingerprint identification data card and electronic device
US20120155721A1 (en) * 2009-12-03 2012-06-21 Huawei Device Co., Ltd Fingerprint Identification Data Card and Electronic Device
US8092238B2 (en) * 2010-05-14 2012-01-10 Hon Hai Precision Industry Co., Ltd. Universal serial bus interface
US20110281473A1 (en) * 2010-05-14 2011-11-17 Hon Hai Precision Industry Co., Ltd. Universal serial bus interface
US8411428B2 (en) * 2010-07-09 2013-04-02 Chi Mei Communication Systems, Inc. Portable storage device
US20120008272A1 (en) * 2010-07-09 2012-01-12 Chi Mei Communication Systems, Inc. Portable storage device
US20120100822A1 (en) * 2010-10-25 2012-04-26 Bandrich, Inc. Wireless network receiver for selectively receiving or exposing an electrical connector
US20120310446A1 (en) * 2011-06-03 2012-12-06 Linda Murphy Murlin
US20130094137A1 (en) * 2011-10-18 2013-04-18 Lite-On Technology Corporation Data storage device
US8681490B2 (en) * 2011-10-18 2014-03-25 Lite-On Technology Corporation Data storage device
US20140082246A1 (en) * 2011-10-26 2014-03-20 Huawei Device Co., Ltd. Data Terminal With a Connection Structure of USB Interface
US9418036B2 (en) * 2011-10-26 2016-08-16 Huawei Device Co., Ltd. Data terminal with a connection structure of USB interface
US9735494B2 (en) 2014-04-30 2017-08-15 Te Connectivity Corporation Pluggable connector having a protective front wall
US9395768B2 (en) * 2014-08-21 2016-07-19 Phison Electronics Corp. Flash drive
US20160111828A1 (en) * 2014-10-15 2016-04-21 Cvilux Corporation Usb device
US9337562B1 (en) * 2014-12-10 2016-05-10 Adata Technology Co., Ltd. Pressable portable storage device
US10824340B2 (en) * 2015-06-12 2020-11-03 Phison Electronics Corp. Method for managing association relationship of physical units between storage area and temporary area, memory control circuit unit, and memory storage apparatus
US20160364141A1 (en) * 2015-06-12 2016-12-15 Phison Electronics Corp. Memory management method, memory control circuit unit, and memory storage apparatus
US10306796B2 (en) * 2017-11-01 2019-05-28 Dell Products L.P. Information handling system rail clip automatic clamping
US20190278340A1 (en) * 2017-11-03 2019-09-12 International Business Machines Corporation Extendable structure for protecting electrical connectors
US10712788B2 (en) * 2017-11-03 2020-07-14 International Business Machines Corporation Extendable structure for protecting electrical connectors
US10359814B2 (en) * 2017-11-03 2019-07-23 International Business Machines Corporation Extendable structure for protecting electrical connectors
US11375625B2 (en) * 2018-04-19 2022-06-28 Innolux Corporation Electronic apparatus
US20210282288A1 (en) * 2018-10-10 2021-09-09 Hewlett-Packard Development Company, L.P. Apparatuses with linearly movable jaws
US10716225B1 (en) * 2019-06-26 2020-07-14 Western Digital Technologies, Inc. Data storage devices and connectors for same

Also Published As

Publication number Publication date
US20090177835A1 (en) 2009-07-09

Similar Documents

Publication Publication Date Title
US7869219B2 (en) Flash drive with spring-loaded retractable connector
US7944702B2 (en) Press-push flash drive apparatus with metal tubular casing and snap-coupled plastic sleeve
US8241047B2 (en) Flash drive with spring-loaded swivel connector
US7771215B1 (en) MLC COB USB flash memory device with sliding plug connector
US7744387B2 (en) Multi-level cell (MLC) rotate flash memory device
US7628622B2 (en) Multi-level cell (MLC) slide flash memory
US7886108B2 (en) Methods and systems of managing memory addresses in a large capacity multi-level cell (MLC) based flash memory device
US7806705B2 (en) Slide flash memory devices
US7092256B1 (en) Retractable card adapter
US7877542B2 (en) High integration of intelligent non-volatile memory device
US7507119B2 (en) USB device with integrated USB plug with USB-substrate supporter inside
US8102662B2 (en) USB package with bistable sliding mechanism
US7440287B1 (en) Extended USB PCBA and device with dual personality
US7420803B2 (en) Universal serial bus flash drive with deploying and retracting functionalities
US7394661B2 (en) System and method for providing a flash memory assembly
US8073985B1 (en) Backward compatible extended USB plug and receptacle with dual personality
US7984303B1 (en) Flash memory devices with security features
US20080256352A1 (en) Methods and systems of booting of an intelligent non-volatile memory microcontroller from various sources
US20040219949A1 (en) Memory drive device for wirelessly accessing data
US8061905B2 (en) Multi-level cell (MLC) dual personality extended fiber optic flash memory device
KR20040075138A (en) Card Type USB Connector, and USB Gender Changer and USB Memory Card using this
US8015348B2 (en) Memory address management systems in a large capacity multi-level cell (MLC) based flash memory device
US20030133270A1 (en) Embedding type signal adapter for memory cards
EP1619607B1 (en) Semiconductor recording device
US7866562B2 (en) Fixed write-protect seamless memory card

Legal Events

Date Code Title Description
AS Assignment

Owner name: SUPER TALENT ELECTRONICS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MA, ABRAHAM C.;NI, JIM CHIN-NAN;NAN, NAN;REEL/FRAME:022173/0209

Effective date: 20090128

AS Assignment

Owner name: SUPER TALENT TECHNOLOGY, CORP., CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:SUPER TALENT ELECTRONIC, INC.;REEL/FRAME:032540/0565

Effective date: 20050124

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Expired due to failure to pay maintenance fee

Effective date: 20150111